Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-29458 (GCVE-0-2022-29458)
Vulnerability from cvelistv5 – Published: 2022-04-18 00:00 – Updated: 2025-06-09 14:53- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:26:05.098Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-29458",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T14:51:41.946756Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T14:53:36.453Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-30T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-29458",
"datePublished": "2022-04-18T00:00:00.000Z",
"dateReserved": "2022-04-18T00:00:00.000Z",
"dateUpdated": "2025-06-09T14:53:36.453Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.3\", \"matchCriteriaId\": \"B88F4454-235A-475C-BFA0-6C47F3947647\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:ncurses:6.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ABD93AB-A515-4191-A13D-AA45A379CBDF\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"13.0\", \"matchCriteriaId\": \"71E032AD-F827-4944-9699-BB1E6D4233FC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\"}, {\"lang\": \"es\", \"value\": \"ncurses versiones 6.3 anteriores al parche 20220416, presentan una lectura fuera de l\\u00edmites y una violaci\\u00f3n de segmentaci\\u00f3n en el archivo convert_strings en tinfo/read_entry.c en la biblioteca terminfo\"}]",
"id": "CVE-2022-29458",
"lastModified": "2024-11-21T06:59:07.650",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:P\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-04-18T21:15:07.600",
"references": "[{\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/28\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/41\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213488\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/28\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/41\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213488\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-29458\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-04-18T21:15:07.600\",\"lastModified\":\"2025-06-09T15:15:27.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\"},{\"lang\":\"es\",\"value\":\"ncurses versiones 6.3 anteriores al parche 20220416, presentan una lectura fuera de l\u00edmites y una violaci\u00f3n de segmentaci\u00f3n en el archivo convert_strings en tinfo/read_entry.c en la biblioteca terminfo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.3\",\"matchCriteriaId\":\"B88F4454-235A-475C-BFA0-6C47F3947647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:ncurses:6.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ABD93AB-A515-4191-A13D-AA45A379CBDF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"71E032AD-F827-4944-9699-BB1E6D4233FC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213488\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html\", \"name\": \"[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/41\", \"name\": \"20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/28\", \"name\": \"20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13\", \"tags\": [\"mailing-list\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T06:26:05.098Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-29458\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-09T14:51:41.946756Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-09T14:53:26.331Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html\"}, {\"url\": \"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html\"}, {\"url\": \"https://support.apple.com/kb/HT213488\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html\", \"name\": \"[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/41\", \"name\": \"20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13\", \"tags\": [\"mailing-list\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/28\", \"name\": \"20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13\", \"tags\": [\"mailing-list\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2022-10-30T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-29458\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-09T14:53:36.453Z\", \"dateReserved\": \"2022-04-18T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2022-04-18T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2025:17006
Vulnerability from csaf_redhat - Published: 2025-09-30 00:33 - Updated: 2025-12-01 22:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ncurses is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.\n\nSecurity Fix(es):\n\n* ncurses: segfaulting OOB read (CVE-2022-29458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17006",
"url": "https://access.redhat.com/errata/RHSA-2025:17006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17006.json"
}
],
"title": "Red Hat Security Advisory: ncurses security update",
"tracking": {
"current_release_date": "2025-12-01T22:02:56+00:00",
"generator": {
"date": "2025-12-01T22:02:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:17006",
"initial_release_date": "2025-09-30T00:33:42+00:00",
"revision_history": [
{
"date": "2025-09-30T00:33:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-30T00:33:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-01T22:02:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_0.1.src",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.src",
"product_id": "ncurses-0:6.2-8.20210508.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_0.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"product": {
"name": "ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"product_id": "ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9_0.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"product": {
"name": "ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"product_id": "ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-term@6.2-8.20210508.el9_0.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-8.20210508.el9_0.1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch"
},
"product_reference": "ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-8.20210508.el9_0.1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch"
},
"product_reference": "ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-8.20210508.el9_0.1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch"
},
"product_reference": "ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-8.20210508.el9_0.1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch"
},
"product_reference": "ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2076483"
}
],
"notes": [
{
"category": "description",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ncurses: segfaulting OOB read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security classifies this issue as having a Low security impact. This vulnerability is present in the tic program which is only used at build-time and does not exist in libncurses. The exploit can only be triggered if the user performs a specific action, such as processing terminfo from source to compiled form using trusted input, which limits the practical impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "RHBZ#2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458"
}
],
"release_date": "2022-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-30T00:33:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17006"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_0.1.noarch",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_0.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ncurses: segfaulting OOB read"
}
]
}
RHSA-2025:16414
Vulnerability from csaf_redhat - Published: 2025-09-23 02:06 - Updated: 2025-12-01 22:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ncurses is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.\n\nSecurity Fix(es):\n\n* ncurses: segfaulting OOB read (CVE-2022-29458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:16414",
"url": "https://access.redhat.com/errata/RHSA-2025:16414"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16414.json"
}
],
"title": "Red Hat Security Advisory: ncurses security update",
"tracking": {
"current_release_date": "2025-12-01T22:02:55+00:00",
"generator": {
"date": "2025-12-01T22:02:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:16414",
"initial_release_date": "2025-09-23T02:06:40+00:00",
"revision_history": [
{
"date": "2025-09-23T02:06:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-23T02:06:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-01T22:02:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"product": {
"name": "ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"product_id": "ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-term@6.2-10.20210508.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"product": {
"name": "ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"product_id": "ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_4.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_4.1.src",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.src",
"product_id": "ncurses-0:6.2-10.20210508.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-10.20210508.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch"
},
"product_reference": "ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-10.20210508.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch"
},
"product_reference": "ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-10.20210508.el9_4.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch"
},
"product_reference": "ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-10.20210508.el9_4.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch"
},
"product_reference": "ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2076483"
}
],
"notes": [
{
"category": "description",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ncurses: segfaulting OOB read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security classifies this issue as having a Low security impact. This vulnerability is present in the tic program which is only used at build-time and does not exist in libncurses. The exploit can only be triggered if the user performs a specific action, such as processing terminfo from source to compiled form using trusted input, which limits the practical impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "RHBZ#2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458"
}
],
"release_date": "2022-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-23T02:06:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:16414"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:ncurses-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-base-0:6.2-10.20210508.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-devel-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:ncurses-term-0:6.2-10.20210508.el9_4.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ncurses: segfaulting OOB read"
}
]
}
RHSA-2025:12876
Vulnerability from csaf_redhat - Published: 2025-08-05 06:37 - Updated: 2025-12-01 22:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ncurses is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.\n\nSecurity Fix(es):\n\n* ncurses: segfaulting OOB read (CVE-2022-29458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12876",
"url": "https://access.redhat.com/errata/RHSA-2025:12876"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12876.json"
}
],
"title": "Red Hat Security Advisory: ncurses security update",
"tracking": {
"current_release_date": "2025-12-01T22:02:38+00:00",
"generator": {
"date": "2025-12-01T22:02:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:12876",
"initial_release_date": "2025-08-05T06:37:33+00:00",
"revision_history": [
{
"date": "2025-08-05T06:37:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-05T06:37:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-01T22:02:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"product": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"product_id": "ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"product": {
"name": "ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"product_id": "ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-term@6.2-10.20210508.el9_6.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"product": {
"name": "ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"product_id": "ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-10.20210508.el9_6.2.src",
"product": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.src",
"product_id": "ncurses-0:6.2-10.20210508.el9_6.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-10.20210508.el9_6.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-10.20210508.el9_6.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch"
},
"product_reference": "ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-10.20210508.el9_6.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch"
},
"product_reference": "ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-10.20210508.el9_6.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch"
},
"product_reference": "ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-10.20210508.el9_6.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch"
},
"product_reference": "ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2076483"
}
],
"notes": [
{
"category": "description",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ncurses: segfaulting OOB read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security classifies this issue as having a Low security impact. This vulnerability is present in the tic program which is only used at build-time and does not exist in libncurses. The exploit can only be triggered if the user performs a specific action, such as processing terminfo from source to compiled form using trusted input, which limits the practical impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "RHBZ#2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458"
}
],
"release_date": "2022-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-05T06:37:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12876"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.src",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-base-0:6.2-10.20210508.el9_6.2.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-c++-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-compat-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-debugsource-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-devel-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-libs-debuginfo-0:6.2-10.20210508.el9_6.2.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:ncurses-term-0:6.2-10.20210508.el9_6.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ncurses: segfaulting OOB read"
}
]
}
RHSA-2025:16418
Vulnerability from csaf_redhat - Published: 2025-09-23 01:37 - Updated: 2025-12-01 22:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ncurses is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.\n\nSecurity Fix(es):\n\n* ncurses: segfaulting OOB read (CVE-2022-29458)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:16418",
"url": "https://access.redhat.com/errata/RHSA-2025:16418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16418.json"
}
],
"title": "Red Hat Security Advisory: ncurses security update",
"tracking": {
"current_release_date": "2025-12-01T22:02:56+00:00",
"generator": {
"date": "2025-12-01T22:02:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:16418",
"initial_release_date": "2025-09-23T01:37:10+00:00",
"revision_history": [
{
"date": "2025-09-23T01:37:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-23T01:37:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-01T22:02:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_2.2.src",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.src",
"product_id": "ncurses-0:6.2-8.20210508.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-compat-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"product": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"product_id": "ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.2-8.20210508.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"product": {
"name": "ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"product_id": "ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"product": {
"name": "ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"product_id": "ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-term@6.2-8.20210508.el9_2.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-8.20210508.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch"
},
"product_reference": "ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-8.20210508.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch"
},
"product_reference": "ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.2-8.20210508.el9_2.2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch"
},
"product_reference": "ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.2-8.20210508.el9_2.2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch"
},
"product_reference": "ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2076483"
}
],
"notes": [
{
"category": "description",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ncurses: segfaulting OOB read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security classifies this issue as having a Low security impact. This vulnerability is present in the tic program which is only used at build-time and does not exist in libncurses. The exploit can only be triggered if the user performs a specific action, such as processing terminfo from source to compiled form using trusted input, which limits the practical impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "RHBZ#2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458"
}
],
"release_date": "2022-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-23T01:37:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:16418"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src",
"AppStream-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"AppStream-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"AppStream-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.src",
"BaseOS-9.2.0.Z.E4S:ncurses-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-base-0:6.2-8.20210508.el9_2.2.noarch",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-c++-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-compat-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-debugsource-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-devel-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.aarch64",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.i686",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.ppc64le",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.s390x",
"BaseOS-9.2.0.Z.E4S:ncurses-libs-debuginfo-0:6.2-8.20210508.el9_2.2.x86_64",
"BaseOS-9.2.0.Z.E4S:ncurses-term-0:6.2-8.20210508.el9_2.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ncurses: segfaulting OOB read"
}
]
}
RHSA-2025:22529
Vulnerability from csaf_redhat - Published: 2025-12-01 21:59 - Updated: 2025-12-05 17:26Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 7.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22529",
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-29458",
"url": "https://access.redhat.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-56433",
"url": "https://access.redhat.com/security/cve/CVE-2024-56433"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-11561",
"url": "https://access.redhat.com/security/cve/CVE-2025-11561"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32414",
"url": "https://access.redhat.com/security/cve/CVE-2025-32414"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32415",
"url": "https://access.redhat.com/security/cve/CVE-2025-32415"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32988",
"url": "https://access.redhat.com/security/cve/CVE-2025-32988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32989",
"url": "https://access.redhat.com/security/cve/CVE-2025-32989"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32990",
"url": "https://access.redhat.com/security/cve/CVE-2025-32990"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6395",
"url": "https://access.redhat.com/security/cve/CVE-2025-6395"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6965",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-8058",
"url": "https://access.redhat.com/security/cve/CVE-2025-8058"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9230",
"url": "https://access.redhat.com/security/cve/CVE-2025-9230"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22529.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2025-12-05T17:26:10+00:00",
"generator": {
"date": "2025-12-05T17:26:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2025:22529",
"initial_release_date": "2025-12-01T21:59:44+00:00",
"revision_history": [
{
"date": "2025-12-01T21:59:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-01T21:59:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-05T17:26:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 7",
"product": {
"name": "Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:7::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Ade1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3A4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Aadaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056?arch=amd64\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd?arch=arm64\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3A6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5?arch=s390x\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ad3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3Ace213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2076483"
}
],
"notes": [
{
"category": "description",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ncurses: segfaulting OOB read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security classifies this issue as having a Low security impact. This vulnerability is present in the tic program which is only used at build-time and does not exist in libncurses. The exploit can only be triggered if the user performs a specific action, such as processing terminfo from source to compiled form using trusted input, which limits the practical impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "RHBZ#2076483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458"
}
],
"release_date": "2022-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ncurses: segfaulting OOB read"
},
{
"cve": "CVE-2024-56433",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"discovery_date": "2024-12-26T09:00:54.065197+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2334165"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in shadow-utils. Affected versions of shadow-utils establish a default /etc/subuid behavior, for example, uid 100000 through 165535 for the first user account, that can conflict with the uids of users defined on locally administered networks. This issue potentially leads to account takeover by leveraging newuidmap for access to an NFS home directory or same-host resources for remote logins by these local network users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-56433"
},
{
"category": "external",
"summary": "RHBZ#2334165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56433"
},
{
"category": "external",
"summary": "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
"url": "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241"
},
{
"category": "external",
"summary": "https://github.com/shadow-maint/shadow/issues/1157",
"url": "https://github.com/shadow-maint/shadow/issues/1157"
},
{
"category": "external",
"summary": "https://github.com/shadow-maint/shadow/releases/tag/4.4",
"url": "https://github.com/shadow-maint/shadow/releases/tag/4.4"
}
],
"release_date": "2024-12-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise"
},
{
"cve": "CVE-2025-6395",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-07-07T09:30:13.037000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2376755"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of null pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies null dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6395"
},
{
"category": "external",
"summary": "RHBZ#2376755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376755"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6395",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6395"
}
],
"release_date": "2025-07-10T07:56:53.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite()"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"cve": "CVE-2025-8058",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-07-23T20:00:41.541234+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2383146"
}
],
"notes": [
{
"category": "description",
"text": "A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: Double free in glibc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-415: Double Free vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software configurations, while least functionality reduces the attack surface by enforcing safe memory allocation and deallocation practices, lowering the risk of double-free vulnerabilities. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code while providing real-time visibility into memory usage, reducing the risk of arbitrary code execution. Static code analysis and peer reviews enforce strong input validation and error handling, minimizing the risk of denial-of-service (DoS) attacks. In the event of successful exploitation, process isolation prevents compromised workloads from accessing other processes\u2019 memory, containing the potential impact. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8058"
},
{
"category": "external",
"summary": "RHBZ#2383146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8058",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8058"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=33185",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33185"
},
{
"category": "external",
"summary": "https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f",
"url": "https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f"
}
],
"release_date": "2025-07-23T19:57:17.138000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: Double free in glibc"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-09-17T12:15:34.387000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2396054"
}
],
"notes": [
{
"category": "description",
"text": "Issue summary: An application trying to decrypt CMS messages encrypted using\npassword based encryption can trigger an out-of-bounds read and write.\n\nImpact summary: This out-of-bounds read may trigger a crash which leads to\nDenial of Service for an application. The out-of-bounds write can cause\na memory corruption which can have various consequences including\na Denial of Service or Execution of attacker-supplied code.\n\nAlthough the consequences of a successful exploit of this vulnerability\ncould be severe, the probability that the attacker would be able to\nperform it is low. Besides, password based (PWRI) encryption support in CMS\nmessages is very rarely used. For that reason the issue was assessed as\nModerate severity according to our Security Policy.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability was rated as Moderate because, while the potential impact includes an application level denial of service and possible arbitrary code execution, successful exploitation is considered unlikely due to the high attack complexity and the fact that password-based CMS encryption (PWRI) is rarely used in real-world deployments.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-787: Out-of-bounds Write or a CWE-125: Out-of-bounds Read vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines and baseline configurations to ensure secure system and software settings, while least functionality reduces the attack surface by disabling unnecessary services and ports. Rigorous development practices, including static analysis, input validation, and error handling, detect and mitigate memory vulnerabilities before deployment. Process isolation and memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) preserve memory integrity by confining faults to individual workloads and preventing unauthorized access. Malicious code protections and continuous system monitoring detect anomalous memory activity and exploitation attempts, reducing the likelihood and impact of out-of-bounds read and write vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9230"
},
{
"category": "external",
"summary": "RHBZ#2396054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230"
}
],
"release_date": "2025-09-30T23:59:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Out-of-bounds read \u0026 write in RFC 3211 KEK Unwrap"
},
{
"acknowledgments": [
{
"names": [
"Zavier Lee"
]
}
],
"cve": "CVE-2025-11561",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"discovery_date": "2025-10-09T12:57:29.851000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402727"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed this issue as High severity for domain-joined Linux systems using default SSSD configurations. While the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled by default, fallback to the an2ln plugin can occur, allowing a domain user who can modify certain Active Directory attributes (such as userPrincipalName or samAccountName) to map to privileged local accounts. This could lead to unauthorized access or elevated privileges on affected Linux hosts. Administrators are advised to review and apply recommended hardening configurations to mitigate this behavior.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-11561"
},
{
"category": "external",
"summary": "RHBZ#2402727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402727"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-11561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11561"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-11561",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11561"
},
{
"category": "external",
"summary": "https://blog.async.sg/kerberos-ldr",
"url": "https://blog.async.sg/kerberos-ldr"
}
],
"release_date": "2025-10-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "To mitigate this issue, ensure the SSSD Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is configured and the an2ln plugin is disabled by adding \"disable = an2ln\" in a krb5 include file, for example /var/lib/sss/pubconf/krb5.include.d/localauth_plugin and make sure it is included in the Kerberos configuration. Apply vendor updates and follow Red Hat guidance for SSSD hardening.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems"
},
{
"cve": "CVE-2025-32414",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"discovery_date": "2025-04-08T04:00:51.284113+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358121"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Out-of-Bounds Read in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug affects parsing of text streams using:\n- the Python bindings (pending deprecation: https://gitlab.gnome.org/GNOME/libxml2/-/issues/891)\n- the libxml2 SAX driver drv_libxml2,\n- the XML Reader API\n\nParsing of binary streams is not affected by this vulnerability.\n\nThe vulnerability exists in the libxml2 package the bug arises because of a mismatch between characters vs. bytes handling: functions xmlPythonFileRead and xmlPythonFileReadRaw may compute a length incorrectly (mistaking character count for byte count), but for a succesful exploitation of this bug requires local access, on top of that the path to exploiation is non trivial, where handling of python binding\u0027s and specific input handling of bytes and charcters are required which makes this outside the scope of an attacker and increases the attack complexity, for these reasons this has been marked as moderate by redhat.\n\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-393: Return of Wrong Status Code vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational needs, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to threats in real time, helping prevent or limit exploitation attempts. Robust input validation and error handling ensure all user inputs are thoroughly validated, supporting consistent and secure system responses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32414"
},
{
"category": "external",
"summary": "RHBZ#2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889"
}
],
"release_date": "2025-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Out-of-Bounds Read in libxml2"
},
{
"cve": "CVE-2025-32415",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-04-17T18:00:46.954384+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2360768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the libxml2 library. A heap-based underflow can be triggered when a crafted XML document is validated against an XML schema with certain identity constraints or when a crafted XML schema is used, causing a crash to the application linked to the library and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted XML file with the application linked to the libxml2 library. Additionally, the only security impact of this vulnerability is a denial of service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32415"
},
{
"category": "external",
"summary": "RHBZ#2360768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2360768"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32415",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32415"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890"
}
],
"release_date": "2025-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Do not process untrusted files with the libxml2 library.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables"
},
{
"cve": "CVE-2025-32988",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-04-15T01:21:36.833000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2359622"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.\n\nThis vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Vulnerability in GnuTLS otherName SAN export",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate rather than Important because, although it involves a memory management flaw (double-free) that can potentially lead to memory corruption, practical exploitation is limited by modern memory protection mechanisms and contextual constraints. The issue occurs only when processing malformed SAN otherName entries through public GnuTLS APIs\u2014an uncommon and controlled code path in most deployments. Furthermore, exploitation for arbitrary code execution is highly dependent on allocator behavior and requires precise heap manipulation, which is non-trivial under defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and hardened memory allocators. In the majority of cases, the outcome would be a crash or denial of service rather than a reliable compromise of integrity or confidentiality. Therefore, given its limited attack surface, dependency on crafted input, and the presence of strong runtime mitigations, the impact justifies a Moderate severity classification instead of Important.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-415: Double Free vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software configurations, while least functionality reduces the attack surface by enforcing safe memory allocation and deallocation practices, lowering the risk of double-free vulnerabilities. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code while providing real-time visibility into memory usage, reducing the risk of arbitrary code execution. Static code analysis and peer reviews enforce strong input validation and error handling, minimizing the risk of denial-of-service (DoS) attacks. In the event of successful exploitation, process isolation prevents compromised workloads from accessing other processes\u2019 memory, containing the potential impact. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory-related vulnerabilities.\n\nAs such, successfully triggering this vulnerability would require a sophisticated attack vector that is capable of accounting for the many native and deployed security mechanisms designed to detect and contain a double-free condition.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32988"
},
{
"category": "external",
"summary": "RHBZ#2359622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359622"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32988",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32988"
}
],
"release_date": "2025-07-10T07:55:14.310000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Vulnerability in GnuTLS otherName SAN export"
},
{
"cve": "CVE-2025-32989",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-04-15T01:21:36.512000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2359621"
}
],
"notes": [
{
"category": "description",
"text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Vulnerability in GnuTLS SCT extension parsing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32989"
},
{
"category": "external",
"summary": "RHBZ#2359621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32989"
}
],
"release_date": "2025-07-10T07:54:13.541000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Vulnerability in GnuTLS SCT extension parsing"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-04-15T01:21:36.656000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2359620"
}
],
"notes": [
{
"category": "description",
"text": "A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Vulnerability in GnuTLS certtool template parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because a heap-buffer-overflow (off-by-one) flaw was found exclusively in the certtool utility\u0027s template parsing logic (part of the gnutls-utils package), and does not affect the core gnutls library itself. This issue is triggered when the tool processes specially crafted settings from a template file, leading to an out-of-bounds NULL pointer write. The resulting memory corruption causes a denial-of-service by crashing the application.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32990"
},
{
"category": "external",
"summary": "RHBZ#2359620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32990",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32990"
}
],
"release_date": "2025-07-09T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-01T21:59:44+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:5a9b2a273a676301e4270312e5d03b2b19222d95ee0f95583fd1eedc956078cd_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:684398687e17d2eff4f713eaee18dea22bbe3285334bfad0d9812fab51c300a8_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:9394923ea473b90739587a7f90ec269963ec5ce399520d8f626d63ad1357a0a2_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d3f279fb0bf1b0e13fce85af7a3976149023cb85faf881bfcf515ae129c3b249_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:0c2ea384ae2c29dbbc965e9c24f1e6e78d2d1922dae44218c7585030c5a7a906_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:721cc49763de142a6eba2dd441ba0dc522500d385d65300219be48d2f31f0c74_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:9fa023730bc77721a1d519ecc1a209b6d4c06b29baa3dcbb5f2dff2921c6cf27_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:4d2f9dc5b2b33ee1c77bbfabcbbb9f4d94d343b04c4de2e4f8b3b81a1f0fd2fe_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:6b79ed10423d954d21dd24c9cb1cf507f6e02c2942ace7fa30cf7af2ffaeb631_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:ce213d48fbefae6b9d5f5a64b79c6ed016afcb646bf7b5742707ed31f9a464a2_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:2fa401bf3bd53d4f2b9ad775b266ee897206e632a70e7a661409de7860b810c8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9b67425fc074cc2154ac38dd8b5e92e5b2bbd46f8899683a23e9020e62ab5adf_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:de1c3da36e3258c2b6032bf2e3f89fb2c6018489deab55bf97d2416294e4dcf6_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:27ce7c22853f9754b91e91cf9b88f9fb99ceea7b9555724fc36b0dddd83c93a4_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:29f771b5f09b0e33d1c2589166a17368f5eec98e46efbe962ecc7a5c8d9ec923_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:6ae4656046c69b9821519e54665d9bc6575f3cf35c3a83fa78b50b7efe95ef53_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:6968e191b6f06b24febd441bd8b6b2d68236a6cee30a233d1ef6fc1191332204_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:992f1649dfed889b9af86da3dcb91a764dc4a0b5918c4ce0945a0c1f5329dfa5_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:adaa24cdf0a56c1fbda2f7ac7f977b07dfc8c12654cbdc8d9dc5c020b2736056_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Vulnerability in GnuTLS certtool template parsing"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2022-AVI-947
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Apple indique que la vulnérabilité CVE-2022-42827 serait activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 9.1 | ||
| Apple | N/A | iPadOS versions antérieures à 16 | ||
| Apple | macOS | macOS Monterey versions antérieures à 12.6.1 | ||
| Apple | Safari | Safari versions antérieures à 16.1 | ||
| Apple | macOS | macOS Ventura versions antérieures à 13 | ||
| Apple | N/A | iOS versions antérieures à 16.1 | ||
| Apple | macOS | macOS Big Sur versions antérieures à 11.7.1 | ||
| Apple | N/A | tvOS versions antérieures à 16.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 16",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.6.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Ventura versions ant\u00e9rieures \u00e0 13",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions ant\u00e9rieures \u00e0 11.7.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1621"
},
{
"name": "CVE-2022-42819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42819"
},
{
"name": "CVE-2022-0261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0261"
},
{
"name": "CVE-2022-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2000"
},
{
"name": "CVE-2022-1381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1381"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-1898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1898"
},
{
"name": "CVE-2022-42832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42832"
},
{
"name": "CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32913"
},
{
"name": "CVE-2022-32928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32928"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2022-42815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42815"
},
{
"name": "CVE-2022-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1968"
},
{
"name": "CVE-2022-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32936"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-42793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42793"
},
{
"name": "CVE-2022-32915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32915"
},
{
"name": "CVE-2022-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1629"
},
{
"name": "CVE-2022-42827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42827"
},
{
"name": "CVE-2022-42830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42830"
},
{
"name": "CVE-2022-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0554"
},
{
"name": "CVE-2022-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32862"
},
{
"name": "CVE-2022-0572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0572"
},
{
"name": "CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2022-1733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1733"
},
{
"name": "CVE-2022-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0943"
},
{
"name": "CVE-2022-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1927"
},
{
"name": "CVE-2022-1851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1851"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2022-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42795"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0368"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2022-42829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42829"
},
{
"name": "CVE-2022-42831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42831"
},
{
"name": "CVE-2022-42806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42806"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2022-42796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42796"
},
{
"name": "CVE-2022-32866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32866"
},
{
"name": "CVE-2022-42808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42808"
},
{
"name": "CVE-2022-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32940"
},
{
"name": "CVE-2022-42790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42790"
},
{
"name": "CVE-2022-42788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42788"
},
{
"name": "CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2022-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0629"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2022-32890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32890"
},
{
"name": "CVE-2022-0729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0729"
},
{
"name": "CVE-2022-42814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42814"
},
{
"name": "CVE-2022-32867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32867"
},
{
"name": "CVE-2022-32924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32924"
},
{
"name": "CVE-2022-32883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32883"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-42818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42818"
},
{
"name": "CVE-2022-42789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42789"
},
{
"name": "CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32918"
},
{
"name": "CVE-2022-32908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32908"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2022-32911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32911"
},
{
"name": "CVE-2022-42813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42813"
},
{
"name": "CVE-2022-32864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32864"
},
{
"name": "CVE-2022-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1942"
},
{
"name": "CVE-2022-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1735"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2022-42809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42809"
},
{
"name": "CVE-2022-0359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0359"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-32898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32898"
},
{
"name": "CVE-2022-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32938"
},
{
"name": "CVE-2022-32827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32827"
},
{
"name": "CVE-2022-26730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26730"
},
{
"name": "CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"name": "CVE-2022-32914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32914"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-32875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32875"
},
{
"name": "CVE-2022-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0361"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-32892",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32892"
},
{
"name": "CVE-2022-32881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32881"
},
{
"name": "CVE-2022-42811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42811"
},
{
"name": "CVE-2022-32905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32905"
},
{
"name": "CVE-2022-32895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32895"
},
{
"name": "CVE-2022-32922",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32922"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-32902",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32902"
},
{
"name": "CVE-2022-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0318"
},
{
"name": "CVE-2022-32904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32904"
},
{
"name": "CVE-2022-32879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32879"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2022-32865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32865"
},
{
"name": "CVE-2022-1769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1769"
},
{
"name": "CVE-2022-32947",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32947"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2022-32858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32858"
},
{
"name": "CVE-2022-32899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32899"
},
{
"name": "CVE-2022-32870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32870"
},
{
"name": "CVE-2022-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0685"
},
{
"name": "CVE-2022-42820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42820"
},
{
"name": "CVE-2022-32934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32934"
},
{
"name": "CVE-2022-42825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42825"
},
{
"name": "CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-42791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42791"
},
{
"name": "CVE-2022-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32946"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-947",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9\u00a0CVE-2022-42827 serait activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213493 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213493"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213489 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213489"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213492 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213492"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213491 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213491"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213494 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213494"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213488 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213488"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213495 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213495"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0935
Vulnerability from certfr_avis - Published: 2025-10-29 - Updated: 2025-10-29
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire versions antérieures à 10.2.0 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 7.2.x antérieures à 7.2.11 | ||
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.1 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 3.x antérieures à 3.2.0 sur Kubernetes | ||
| VMware | Tanzu | Tanzu pour Valkey versions 8.1.x antérieures à 8.1.4 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 8.0.x antérieures à 8.0.6 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.2.0",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 7.2.x ant\u00e9rieures \u00e0 7.2.11",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.1",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 3.x ant\u00e9rieures \u00e0 3.2.0 sur Kubernetes",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.1.x ant\u00e9rieures \u00e0 8.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.0.x ant\u00e9rieures \u00e0 8.0.6",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-49844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49844"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46819"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46817"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46818"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-10-29T00:00:00",
"last_revision_date": "2025-10-29T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0935",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36259",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36259"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36260",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36260"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36261",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36261"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36258",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36258"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36262",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36262"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36263",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36263"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36264",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36264"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2022-AVI-947
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Apple indique que la vulnérabilité CVE-2022-42827 serait activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 9.1 | ||
| Apple | N/A | iPadOS versions antérieures à 16 | ||
| Apple | macOS | macOS Monterey versions antérieures à 12.6.1 | ||
| Apple | Safari | Safari versions antérieures à 16.1 | ||
| Apple | macOS | macOS Ventura versions antérieures à 13 | ||
| Apple | N/A | iOS versions antérieures à 16.1 | ||
| Apple | macOS | macOS Big Sur versions antérieures à 11.7.1 | ||
| Apple | N/A | tvOS versions antérieures à 16.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 16",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.6.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Ventura versions ant\u00e9rieures \u00e0 13",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions ant\u00e9rieures \u00e0 11.7.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1621"
},
{
"name": "CVE-2022-42819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42819"
},
{
"name": "CVE-2022-0261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0261"
},
{
"name": "CVE-2022-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2000"
},
{
"name": "CVE-2022-1381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1381"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-1898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1898"
},
{
"name": "CVE-2022-42832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42832"
},
{
"name": "CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32913"
},
{
"name": "CVE-2022-32928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32928"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2022-42815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42815"
},
{
"name": "CVE-2022-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1968"
},
{
"name": "CVE-2022-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32936"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-42793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42793"
},
{
"name": "CVE-2022-32915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32915"
},
{
"name": "CVE-2022-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1629"
},
{
"name": "CVE-2022-42827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42827"
},
{
"name": "CVE-2022-42830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42830"
},
{
"name": "CVE-2022-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0554"
},
{
"name": "CVE-2022-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32862"
},
{
"name": "CVE-2022-0572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0572"
},
{
"name": "CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2022-1733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1733"
},
{
"name": "CVE-2022-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0943"
},
{
"name": "CVE-2022-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1927"
},
{
"name": "CVE-2022-1851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1851"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2022-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42795"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0368"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2022-42829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42829"
},
{
"name": "CVE-2022-42831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42831"
},
{
"name": "CVE-2022-42806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42806"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2022-42796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42796"
},
{
"name": "CVE-2022-32866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32866"
},
{
"name": "CVE-2022-42808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42808"
},
{
"name": "CVE-2022-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32940"
},
{
"name": "CVE-2022-42790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42790"
},
{
"name": "CVE-2022-42788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42788"
},
{
"name": "CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2022-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0629"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2022-32890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32890"
},
{
"name": "CVE-2022-0729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0729"
},
{
"name": "CVE-2022-42814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42814"
},
{
"name": "CVE-2022-32867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32867"
},
{
"name": "CVE-2022-32924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32924"
},
{
"name": "CVE-2022-32883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32883"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-42818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42818"
},
{
"name": "CVE-2022-42789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42789"
},
{
"name": "CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32918"
},
{
"name": "CVE-2022-32908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32908"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2022-32911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32911"
},
{
"name": "CVE-2022-42813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42813"
},
{
"name": "CVE-2022-32864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32864"
},
{
"name": "CVE-2022-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1942"
},
{
"name": "CVE-2022-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1735"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2022-42809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42809"
},
{
"name": "CVE-2022-0359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0359"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-32898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32898"
},
{
"name": "CVE-2022-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32938"
},
{
"name": "CVE-2022-32827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32827"
},
{
"name": "CVE-2022-26730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26730"
},
{
"name": "CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"name": "CVE-2022-32914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32914"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-32875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32875"
},
{
"name": "CVE-2022-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0361"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-32892",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32892"
},
{
"name": "CVE-2022-32881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32881"
},
{
"name": "CVE-2022-42811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42811"
},
{
"name": "CVE-2022-32905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32905"
},
{
"name": "CVE-2022-32895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32895"
},
{
"name": "CVE-2022-32922",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32922"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-32902",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32902"
},
{
"name": "CVE-2022-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0318"
},
{
"name": "CVE-2022-32904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32904"
},
{
"name": "CVE-2022-32879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32879"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2022-32865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32865"
},
{
"name": "CVE-2022-1769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1769"
},
{
"name": "CVE-2022-32947",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32947"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2022-32858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32858"
},
{
"name": "CVE-2022-32899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32899"
},
{
"name": "CVE-2022-32870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32870"
},
{
"name": "CVE-2022-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0685"
},
{
"name": "CVE-2022-42820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42820"
},
{
"name": "CVE-2022-32934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32934"
},
{
"name": "CVE-2022-42825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42825"
},
{
"name": "CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-42791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42791"
},
{
"name": "CVE-2022-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32946"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-947",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9\u00a0CVE-2022-42827 serait activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213493 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213493"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213489 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213489"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213492 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213492"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213491 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213491"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213494 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213494"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213488 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213488"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213495 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213495"
}
]
}
CERTFR-2025-AVI-0935
Vulnerability from certfr_avis - Published: 2025-10-29 - Updated: 2025-10-29
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire versions antérieures à 10.2.0 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 7.2.x antérieures à 7.2.11 | ||
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.1 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 3.x antérieures à 3.2.0 sur Kubernetes | ||
| VMware | Tanzu | Tanzu pour Valkey versions 8.1.x antérieures à 8.1.4 | ||
| VMware | Tanzu | Tanzu pour Valkey versions 8.0.x antérieures à 8.0.6 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.2.0",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 7.2.x ant\u00e9rieures \u00e0 7.2.11",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.1",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 3.x ant\u00e9rieures \u00e0 3.2.0 sur Kubernetes",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.1.x ant\u00e9rieures \u00e0 8.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.0.x ant\u00e9rieures \u00e0 8.0.6",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-49844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49844"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-46819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46819"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-46817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46817"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-46818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46818"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-10-29T00:00:00",
"last_revision_date": "2025-10-29T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0935",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36259",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36259"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36260",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36260"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36261",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36261"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36258",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36258"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36262",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36262"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36263",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36263"
},
{
"published_at": "2025-10-28",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36264",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36264"
}
]
}
WID-SEC-W-2023-0561
Vulnerability from csaf_certbund - Published: 2023-03-02 23:00 - Updated: 2023-05-18 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0561 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0561.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0561 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0561"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-002 vom 2023-03-23",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/03/Xerox-Security-Bulletin-XRX23-002-FreeFlow-Print-Server-v2_Windows10.pdf"
},
{
"category": "external",
"summary": "Xerox Mini Bulletin XRX21A vom 2023-03-02",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/03/Xerox-Security-Bulletin-XRX23-001-FreeFlow%C2%AE-Print-Server-v7.pdf"
}
],
"source_lang": "en-US",
"title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-05-18T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:46:07.359+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0561",
"initial_release_date": "2023-03-02T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-03-02T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-03-22T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-04-03T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-05-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server 7",
"product": {
"name": "Xerox FreeFlow Print Server 7",
"product_id": "T000872",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:7"
}
}
},
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server 9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
},
{
"category": "product_name",
"name": "Xerox FreeFlow Print Server v2",
"product": {
"name": "Xerox FreeFlow Print Server v2",
"product_id": "T014888",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v2"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21900",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2023-21900"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2022-46882",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-46882"
},
{
"cve": "CVE-2022-46881",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-46881"
},
{
"cve": "CVE-2022-46880",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-46880"
},
{
"cve": "CVE-2022-46878",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-46878"
},
{
"cve": "CVE-2022-46875",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-46875"
},
{
"cve": "CVE-2022-46874",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-46874"
},
{
"cve": "CVE-2022-46872",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-46872"
},
{
"cve": "CVE-2022-45421",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45421"
},
{
"cve": "CVE-2022-45420",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45420"
},
{
"cve": "CVE-2022-45419",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45419"
},
{
"cve": "CVE-2022-45418",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45418"
},
{
"cve": "CVE-2022-45417",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45417"
},
{
"cve": "CVE-2022-45416",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45416"
},
{
"cve": "CVE-2022-45415",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45415"
},
{
"cve": "CVE-2022-45414",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45414"
},
{
"cve": "CVE-2022-45413",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45413"
},
{
"cve": "CVE-2022-45412",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45412"
},
{
"cve": "CVE-2022-45411",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45411"
},
{
"cve": "CVE-2022-45410",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45410"
},
{
"cve": "CVE-2022-45409",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45409"
},
{
"cve": "CVE-2022-45408",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45408"
},
{
"cve": "CVE-2022-45407",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45407"
},
{
"cve": "CVE-2022-45406",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45406"
},
{
"cve": "CVE-2022-45405",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45405"
},
{
"cve": "CVE-2022-45404",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45404"
},
{
"cve": "CVE-2022-45403",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45403"
},
{
"cve": "CVE-2022-45063",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45063"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43548",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-43548"
},
{
"cve": "CVE-2022-42932",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-42932"
},
{
"cve": "CVE-2022-42929",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-42929"
},
{
"cve": "CVE-2022-42928",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-42928"
},
{
"cve": "CVE-2022-42927",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-42927"
},
{
"cve": "CVE-2022-42252",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-42252"
},
{
"cve": "CVE-2022-41556",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-41556"
},
{
"cve": "CVE-2022-41323",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-41323"
},
{
"cve": "CVE-2022-40962",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-40962"
},
{
"cve": "CVE-2022-40960",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-40960"
},
{
"cve": "CVE-2022-40959",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-40959"
},
{
"cve": "CVE-2022-40958",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-40958"
},
{
"cve": "CVE-2022-40957",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-40957"
},
{
"cve": "CVE-2022-40956",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-40956"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-39260",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-39260"
},
{
"cve": "CVE-2022-39253",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-39253"
},
{
"cve": "CVE-2022-3786",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3786"
},
{
"cve": "CVE-2022-37797",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-37797"
},
{
"cve": "CVE-2022-37454",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-36087",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-36087"
},
{
"cve": "CVE-2022-36059",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-36059"
},
{
"cve": "CVE-2022-3602",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3602"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-3598",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3598"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3570",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3570"
},
{
"cve": "CVE-2022-35256",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-35256"
},
{
"cve": "CVE-2022-35255",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-35255"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-3276",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3276"
},
{
"cve": "CVE-2022-32222",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-32222"
},
{
"cve": "CVE-2022-32215",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-32215"
},
{
"cve": "CVE-2022-32213",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-32213"
},
{
"cve": "CVE-2022-32212",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-32212"
},
{
"cve": "CVE-2022-3204",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3204"
},
{
"cve": "CVE-2022-3190",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3190"
},
{
"cve": "CVE-2022-31630",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-31630"
},
{
"cve": "CVE-2022-31629",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-31629"
},
{
"cve": "CVE-2022-31628",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-31628"
},
{
"cve": "CVE-2022-3155",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3155"
},
{
"cve": "CVE-2022-3034",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3034"
},
{
"cve": "CVE-2022-3033",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3033"
},
{
"cve": "CVE-2022-3032",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-3032"
},
{
"cve": "CVE-2022-29458",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-29458"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-29154",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-29154"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-27406",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-27406"
},
{
"cve": "CVE-2022-27405",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-27405"
},
{
"cve": "CVE-2022-27404",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-27404"
},
{
"cve": "CVE-2022-26981",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-26981"
},
{
"cve": "CVE-2022-24765",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-24765"
},
{
"cve": "CVE-2022-24070",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-24070"
},
{
"cve": "CVE-2022-23901",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-23901"
},
{
"cve": "CVE-2022-22844",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-22844"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-21658",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-21658"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2122",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2122"
},
{
"cve": "CVE-2022-2058",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2058"
},
{
"cve": "CVE-2022-2057",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2057"
},
{
"cve": "CVE-2022-2056",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-2056"
},
{
"cve": "CVE-2022-1925",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1925"
},
{
"cve": "CVE-2022-1924",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1924"
},
{
"cve": "CVE-2022-1923",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1923"
},
{
"cve": "CVE-2022-1922",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1922"
},
{
"cve": "CVE-2022-1921",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1921"
},
{
"cve": "CVE-2022-1920",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1920"
},
{
"cve": "CVE-2022-1348",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1348"
},
{
"cve": "CVE-2022-1056",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-1056"
},
{
"cve": "CVE-2022-0924",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0924"
},
{
"cve": "CVE-2022-0909",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0909"
},
{
"cve": "CVE-2022-0908",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0908"
},
{
"cve": "CVE-2022-0907",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0907"
},
{
"cve": "CVE-2022-0891",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0891"
},
{
"cve": "CVE-2022-0865",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0865"
},
{
"cve": "CVE-2022-0562",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0562"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2021-46823",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2021-46823"
},
{
"cve": "CVE-2021-42694",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2021-42694"
},
{
"cve": "CVE-2021-42574",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2021-42574"
},
{
"cve": "CVE-2021-37750",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2021-37750"
},
{
"cve": "CVE-2021-28544",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2021-28544"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2019-6111",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2019-6111"
},
{
"cve": "CVE-2018-7160",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2018-7160"
},
{
"cve": "CVE-2015-20107",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2015-20107"
},
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden."
}
],
"product_status": {
"known_affected": [
"T014888",
"T000872",
"T002977"
]
},
"release_date": "2023-03-02T23:00:00.000+00:00",
"title": "CVE-2006-20001"
}
]
}
WID-SEC-W-2022-1846
Vulnerability from csaf_certbund - Published: 2022-10-24 22:00 - Updated: 2024-09-16 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1846 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1846 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846"
},
{
"category": "external",
"summary": "Apple Security Advisory HT213488 vom 2022-10-24",
"url": "https://support.apple.com/en-us/HT213488"
},
{
"category": "external",
"summary": "Apple Security Advisory HT213493 vom 2022-10-24",
"url": "https://support.apple.com/en-us/HT213493"
},
{
"category": "external",
"summary": "Apple Security Advisory HT213494 vom 2022-10-24",
"url": "https://support.apple.com/en-us/HT213494"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-16T22:00:00.000+00:00",
"generator": {
"date": "2024-09-17T08:17:03.625+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2022-1846",
"initial_release_date": "2022-10-24T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-10-24T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-10-27T22:00:00.000+00:00",
"number": "2",
"summary": "CVEs erg\u00e4nzt"
},
{
"date": "2023-06-27T22:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2023-08-14T22:00:00.000+00:00",
"number": "4",
"summary": "CVE Nummern erg\u00e4nzt"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "5",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "6",
"summary": "CVE-2022-46723 erg\u00e4nzt"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Ventura_13",
"product": {
"name": "Apple macOS Ventura_13",
"product_id": "T025102",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura_13"
}
}
},
{
"category": "product_version",
"name": "Big Sur 11.7.1",
"product": {
"name": "Apple macOS Big Sur 11.7.1",
"product_id": "T025103",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:big_sur_11.7.1"
}
}
},
{
"category": "product_version",
"name": "Monterey 12.6.1",
"product": {
"name": "Apple macOS Monterey 12.6.1",
"product_id": "T025104",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:monterey_12.6.1"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-39537",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2021-39537"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0368",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0368"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0554",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0554"
},
{
"cve": "CVE-2022-0572",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0572"
},
{
"cve": "CVE-2022-0629",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0629"
},
{
"cve": "CVE-2022-0685",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0685"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0714",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0714"
},
{
"cve": "CVE-2022-0729",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0729"
},
{
"cve": "CVE-2022-0943",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0943"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1621",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1621"
},
{
"cve": "CVE-2022-1622",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1622"
},
{
"cve": "CVE-2022-1629",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1629"
},
{
"cve": "CVE-2022-1674",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1674"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1725",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1725"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1769",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1769"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1942",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1942"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-2000",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2000"
},
{
"cve": "CVE-2022-2042",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2042"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-26699",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-26699"
},
{
"cve": "CVE-2022-26730",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-26730"
},
{
"cve": "CVE-2022-28739",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-28739"
},
{
"cve": "CVE-2022-29458",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-29458"
},
{
"cve": "CVE-2022-32205",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32827",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32827"
},
{
"cve": "CVE-2022-32835",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32835"
},
{
"cve": "CVE-2022-32858",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32858"
},
{
"cve": "CVE-2022-32859",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32859"
},
{
"cve": "CVE-2022-32862",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32862"
},
{
"cve": "CVE-2022-32864",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32864"
},
{
"cve": "CVE-2022-32865",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32865"
},
{
"cve": "CVE-2022-32866",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32866"
},
{
"cve": "CVE-2022-32867",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32867"
},
{
"cve": "CVE-2022-32870",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32870"
},
{
"cve": "CVE-2022-32875",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32875"
},
{
"cve": "CVE-2022-32876",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32876"
},
{
"cve": "CVE-2022-32877",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32877"
},
{
"cve": "CVE-2022-32879",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32879"
},
{
"cve": "CVE-2022-32881",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32881"
},
{
"cve": "CVE-2022-32883",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32883"
},
{
"cve": "CVE-2022-32886",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32886"
},
{
"cve": "CVE-2022-32888",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32888"
},
{
"cve": "CVE-2022-32890",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32890"
},
{
"cve": "CVE-2022-32892",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32892"
},
{
"cve": "CVE-2022-32895",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32895"
},
{
"cve": "CVE-2022-32898",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32898"
},
{
"cve": "CVE-2022-32899",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32899"
},
{
"cve": "CVE-2022-32902",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32902"
},
{
"cve": "CVE-2022-32903",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32903"
},
{
"cve": "CVE-2022-32904",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32904"
},
{
"cve": "CVE-2022-32905",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32905"
},
{
"cve": "CVE-2022-32907",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32907"
},
{
"cve": "CVE-2022-32908",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32908"
},
{
"cve": "CVE-2022-32909",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32909"
},
{
"cve": "CVE-2022-32911",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32911"
},
{
"cve": "CVE-2022-32912",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32912"
},
{
"cve": "CVE-2022-32913",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32913"
},
{
"cve": "CVE-2022-32914",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32914"
},
{
"cve": "CVE-2022-32915",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32915"
},
{
"cve": "CVE-2022-32918",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32918"
},
{
"cve": "CVE-2022-32922",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32922"
},
{
"cve": "CVE-2022-32924",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32924"
},
{
"cve": "CVE-2022-32928",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32928"
},
{
"cve": "CVE-2022-32934",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32934"
},
{
"cve": "CVE-2022-32936",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32936"
},
{
"cve": "CVE-2022-32938",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32938"
},
{
"cve": "CVE-2022-32940",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32940"
},
{
"cve": "CVE-2022-32947",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32947"
},
{
"cve": "CVE-2022-42788",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42788"
},
{
"cve": "CVE-2022-42789",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42789"
},
{
"cve": "CVE-2022-42790",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42790"
},
{
"cve": "CVE-2022-42791",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42791"
},
{
"cve": "CVE-2022-42793",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42793"
},
{
"cve": "CVE-2022-42795",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42795"
},
{
"cve": "CVE-2022-42796",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42796"
},
{
"cve": "CVE-2022-42799",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42799"
},
{
"cve": "CVE-2022-42806",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42806"
},
{
"cve": "CVE-2022-42808",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42808"
},
{
"cve": "CVE-2022-42809",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42809"
},
{
"cve": "CVE-2022-42811",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42811"
},
{
"cve": "CVE-2022-42813",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42813"
},
{
"cve": "CVE-2022-42814",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42814"
},
{
"cve": "CVE-2022-42815",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42815"
},
{
"cve": "CVE-2022-42818",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42818"
},
{
"cve": "CVE-2022-42819",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42819"
},
{
"cve": "CVE-2022-42820",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42820"
},
{
"cve": "CVE-2022-42823",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42823"
},
{
"cve": "CVE-2022-42824",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42824"
},
{
"cve": "CVE-2022-42825",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42825"
},
{
"cve": "CVE-2022-42828",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42828"
},
{
"cve": "CVE-2022-42829",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42829"
},
{
"cve": "CVE-2022-42830",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42830"
},
{
"cve": "CVE-2022-42831",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42831"
},
{
"cve": "CVE-2022-42832",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42832"
},
{
"cve": "CVE-2022-42833",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42833"
},
{
"cve": "CVE-2022-42834",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42834"
},
{
"cve": "CVE-2022-42838",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42838"
},
{
"cve": "CVE-2022-42860",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42860"
},
{
"cve": "CVE-2022-46709",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46709"
},
{
"cve": "CVE-2022-46712",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46712"
},
{
"cve": "CVE-2022-46713",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46713"
},
{
"cve": "CVE-2022-46721",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46721"
},
{
"cve": "CVE-2022-46722",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46722"
},
{
"cve": "CVE-2022-46723",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46723"
},
{
"cve": "CVE-2022-47915",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-47915"
},
{
"cve": "CVE-2022-47965",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-47965"
},
{
"cve": "CVE-2022-48504",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48504"
},
{
"cve": "CVE-2022-48505",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48505"
},
{
"cve": "CVE-2022-48577",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48577"
},
{
"cve": "CVE-2022-48683",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48683"
}
]
}
WID-SEC-W-2025-1719
Vulnerability from csaf_certbund - Published: 2025-08-04 22:00 - Updated: 2025-12-01 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren, m\u00f6glicherweise vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1719 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1719.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1719 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1719"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12876"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12876 vom 2025-08-05",
"url": "http://linux.oracle.com/errata/ELSA-2025-12876.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15337 vom 2025-09-04",
"url": "https://access.redhat.com/errata/RHSA-2025:15337"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7244160 vom 2025-09-05",
"url": "https://www.ibm.com/support/pages/node/7244160"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16418 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16418"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16414 vom 2025-09-23",
"url": "https://access.redhat.com/errata/RHSA-2025:16414"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17006 vom 2025-09-30",
"url": "https://access.redhat.com/errata/RHSA-2025:17006"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22529 vom 2025-12-02",
"url": "https://access.redhat.com/errata/RHSA-2025:22529"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (ncurses): Schwachstelle erm\u00f6glicht nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2025-12-01T23:00:00.000+00:00",
"generator": {
"date": "2025-12-02T07:58:20.758+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1719",
"initial_release_date": "2025-08-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
},
{
"category": "product_version",
"name": "Container",
"product": {
"name": "IBM MQ Container",
"product_id": "T040640",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:container"
}
}
}
],
"category": "product_name",
"name": "MQ"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T045891",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"product_status": {
"known_affected": [
"67646",
"T045891",
"T036688",
"T004914",
"T040640"
]
},
"release_date": "2025-08-04T22:00:00.000+00:00",
"title": "CVE-2022-29458"
}
]
}
MSRC_CVE-2022-29458
Vulnerability from csaf_microsoft - Published: 2022-04-02 00:00 - Updated: 2022-04-28 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29458 ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-29458.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"tracking": {
"current_release_date": "2022-04-28T00:00:00.000Z",
"generator": {
"date": "2025-10-19T23:28:52.854Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-29458",
"initial_release_date": "2022-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-04-28T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 ncurses 6.3-2",
"product": {
"name": "\u003ccm1 ncurses 6.3-2",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 ncurses 6.3-2",
"product": {
"name": "cm1 ncurses 6.3-2",
"product_id": "18739"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 ncurses 6.3-2",
"product": {
"name": "\u003ccbl2 ncurses 6.3-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 ncurses 6.3-2",
"product": {
"name": "cbl2 ncurses 6.3-2",
"product_id": "18740"
}
}
],
"category": "product_name",
"name": "ncurses"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 ncurses 6.3-2 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 ncurses 6.3-2 as a component of CBL Mariner 1.0",
"product_id": "18739-16820"
},
"product_reference": "18739",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 ncurses 6.3-2 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 ncurses 6.3-2 as a component of CBL Mariner 2.0",
"product_id": "18740-17086"
},
"product_reference": "18740",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18739-16820",
"18740-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29458 ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-29458.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-28T00:00:00.000Z",
"details": "6.3-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.1,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library."
}
]
}
OPENSUSE-SU-2024:12020-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libncurses5-32bit-6.3.20220416-16.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libncurses5-32bit-6.3.20220416-16.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12020",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12020-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29458 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29458/"
}
],
"title": "libncurses5-32bit-6.3.20220416-16.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12020-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.3.20220416-16.1.aarch64",
"product": {
"name": "libncurses5-6.3.20220416-16.1.aarch64",
"product_id": "libncurses5-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-6.3.20220416-16.1.aarch64",
"product": {
"name": "libncurses5-32bit-6.3.20220416-16.1.aarch64",
"product_id": "libncurses5-32bit-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libncurses6-6.3.20220416-16.1.aarch64",
"product": {
"name": "libncurses6-6.3.20220416-16.1.aarch64",
"product_id": "libncurses6-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-6.3.20220416-16.1.aarch64",
"product": {
"name": "libncurses6-32bit-6.3.20220416-16.1.aarch64",
"product_id": "libncurses6-32bit-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses-devel-6.3.20220416-16.1.aarch64",
"product_id": "ncurses-devel-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.aarch64",
"product_id": "ncurses-devel-32bit-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-static-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses-devel-static-6.3.20220416-16.1.aarch64",
"product_id": "ncurses-devel-static-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-examples-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses-examples-6.3.20220416-16.1.aarch64",
"product_id": "ncurses-examples-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses-utils-6.3.20220416-16.1.aarch64",
"product_id": "ncurses-utils-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses5-devel-6.3.20220416-16.1.aarch64",
"product_id": "ncurses5-devel-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.aarch64",
"product_id": "ncurses5-devel-32bit-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-static-6.3.20220416-16.1.aarch64",
"product": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.aarch64",
"product_id": "ncurses5-devel-static-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "tack-6.3.20220416-16.1.aarch64",
"product": {
"name": "tack-6.3.20220416-16.1.aarch64",
"product_id": "tack-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-6.3.20220416-16.1.aarch64",
"product": {
"name": "terminfo-6.3.20220416-16.1.aarch64",
"product_id": "terminfo-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.3.20220416-16.1.aarch64",
"product": {
"name": "terminfo-base-6.3.20220416-16.1.aarch64",
"product_id": "terminfo-base-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.3.20220416-16.1.aarch64",
"product": {
"name": "terminfo-iterm-6.3.20220416-16.1.aarch64",
"product_id": "terminfo-iterm-6.3.20220416-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.3.20220416-16.1.aarch64",
"product": {
"name": "terminfo-screen-6.3.20220416-16.1.aarch64",
"product_id": "terminfo-screen-6.3.20220416-16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.3.20220416-16.1.ppc64le",
"product": {
"name": "libncurses5-6.3.20220416-16.1.ppc64le",
"product_id": "libncurses5-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-6.3.20220416-16.1.ppc64le",
"product": {
"name": "libncurses5-32bit-6.3.20220416-16.1.ppc64le",
"product_id": "libncurses5-32bit-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libncurses6-6.3.20220416-16.1.ppc64le",
"product": {
"name": "libncurses6-6.3.20220416-16.1.ppc64le",
"product_id": "libncurses6-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-6.3.20220416-16.1.ppc64le",
"product": {
"name": "libncurses6-32bit-6.3.20220416-16.1.ppc64le",
"product_id": "libncurses6-32bit-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses-devel-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses-devel-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses-devel-32bit-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-devel-static-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses-devel-static-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses-devel-static-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-examples-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses-examples-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses-examples-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses-utils-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses-utils-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses5-devel-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses5-devel-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-static-6.3.20220416-16.1.ppc64le",
"product": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.ppc64le",
"product_id": "ncurses5-devel-static-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tack-6.3.20220416-16.1.ppc64le",
"product": {
"name": "tack-6.3.20220416-16.1.ppc64le",
"product_id": "tack-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-6.3.20220416-16.1.ppc64le",
"product": {
"name": "terminfo-6.3.20220416-16.1.ppc64le",
"product_id": "terminfo-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.3.20220416-16.1.ppc64le",
"product": {
"name": "terminfo-base-6.3.20220416-16.1.ppc64le",
"product_id": "terminfo-base-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.3.20220416-16.1.ppc64le",
"product": {
"name": "terminfo-iterm-6.3.20220416-16.1.ppc64le",
"product_id": "terminfo-iterm-6.3.20220416-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.3.20220416-16.1.ppc64le",
"product": {
"name": "terminfo-screen-6.3.20220416-16.1.ppc64le",
"product_id": "terminfo-screen-6.3.20220416-16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.3.20220416-16.1.s390x",
"product": {
"name": "libncurses5-6.3.20220416-16.1.s390x",
"product_id": "libncurses5-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-6.3.20220416-16.1.s390x",
"product": {
"name": "libncurses5-32bit-6.3.20220416-16.1.s390x",
"product_id": "libncurses5-32bit-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses6-6.3.20220416-16.1.s390x",
"product": {
"name": "libncurses6-6.3.20220416-16.1.s390x",
"product_id": "libncurses6-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-6.3.20220416-16.1.s390x",
"product": {
"name": "libncurses6-32bit-6.3.20220416-16.1.s390x",
"product_id": "libncurses6-32bit-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses-devel-6.3.20220416-16.1.s390x",
"product_id": "ncurses-devel-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.s390x",
"product_id": "ncurses-devel-32bit-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-devel-static-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses-devel-static-6.3.20220416-16.1.s390x",
"product_id": "ncurses-devel-static-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-examples-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses-examples-6.3.20220416-16.1.s390x",
"product_id": "ncurses-examples-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses-utils-6.3.20220416-16.1.s390x",
"product_id": "ncurses-utils-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses5-devel-6.3.20220416-16.1.s390x",
"product_id": "ncurses5-devel-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.s390x",
"product_id": "ncurses5-devel-32bit-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-static-6.3.20220416-16.1.s390x",
"product": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.s390x",
"product_id": "ncurses5-devel-static-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "tack-6.3.20220416-16.1.s390x",
"product": {
"name": "tack-6.3.20220416-16.1.s390x",
"product_id": "tack-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-6.3.20220416-16.1.s390x",
"product": {
"name": "terminfo-6.3.20220416-16.1.s390x",
"product_id": "terminfo-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.3.20220416-16.1.s390x",
"product": {
"name": "terminfo-base-6.3.20220416-16.1.s390x",
"product_id": "terminfo-base-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.3.20220416-16.1.s390x",
"product": {
"name": "terminfo-iterm-6.3.20220416-16.1.s390x",
"product_id": "terminfo-iterm-6.3.20220416-16.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.3.20220416-16.1.s390x",
"product": {
"name": "terminfo-screen-6.3.20220416-16.1.s390x",
"product_id": "terminfo-screen-6.3.20220416-16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.3.20220416-16.1.x86_64",
"product": {
"name": "libncurses5-6.3.20220416-16.1.x86_64",
"product_id": "libncurses5-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-6.3.20220416-16.1.x86_64",
"product": {
"name": "libncurses5-32bit-6.3.20220416-16.1.x86_64",
"product_id": "libncurses5-32bit-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-6.3.20220416-16.1.x86_64",
"product": {
"name": "libncurses6-6.3.20220416-16.1.x86_64",
"product_id": "libncurses6-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-6.3.20220416-16.1.x86_64",
"product": {
"name": "libncurses6-32bit-6.3.20220416-16.1.x86_64",
"product_id": "libncurses6-32bit-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses-devel-6.3.20220416-16.1.x86_64",
"product_id": "ncurses-devel-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.x86_64",
"product_id": "ncurses-devel-32bit-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-static-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses-devel-static-6.3.20220416-16.1.x86_64",
"product_id": "ncurses-devel-static-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-examples-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses-examples-6.3.20220416-16.1.x86_64",
"product_id": "ncurses-examples-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses-utils-6.3.20220416-16.1.x86_64",
"product_id": "ncurses-utils-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses5-devel-6.3.20220416-16.1.x86_64",
"product_id": "ncurses5-devel-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.x86_64",
"product_id": "ncurses5-devel-32bit-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-static-6.3.20220416-16.1.x86_64",
"product": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.x86_64",
"product_id": "ncurses5-devel-static-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "tack-6.3.20220416-16.1.x86_64",
"product": {
"name": "tack-6.3.20220416-16.1.x86_64",
"product_id": "tack-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-6.3.20220416-16.1.x86_64",
"product": {
"name": "terminfo-6.3.20220416-16.1.x86_64",
"product_id": "terminfo-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.3.20220416-16.1.x86_64",
"product": {
"name": "terminfo-base-6.3.20220416-16.1.x86_64",
"product_id": "terminfo-base-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.3.20220416-16.1.x86_64",
"product": {
"name": "terminfo-iterm-6.3.20220416-16.1.x86_64",
"product_id": "terminfo-iterm-6.3.20220416-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.3.20220416-16.1.x86_64",
"product": {
"name": "terminfo-screen-6.3.20220416-16.1.x86_64",
"product_id": "terminfo-screen-6.3.20220416-16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.aarch64"
},
"product_reference": "libncurses5-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.ppc64le"
},
"product_reference": "libncurses5-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.s390x"
},
"product_reference": "libncurses5-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.x86_64"
},
"product_reference": "libncurses5-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.aarch64"
},
"product_reference": "libncurses5-32bit-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.ppc64le"
},
"product_reference": "libncurses5-32bit-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.s390x"
},
"product_reference": "libncurses5-32bit-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.x86_64"
},
"product_reference": "libncurses5-32bit-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.aarch64"
},
"product_reference": "libncurses6-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.ppc64le"
},
"product_reference": "libncurses6-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.s390x"
},
"product_reference": "libncurses6-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.x86_64"
},
"product_reference": "libncurses6-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.aarch64"
},
"product_reference": "libncurses6-32bit-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.ppc64le"
},
"product_reference": "libncurses6-32bit-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.s390x"
},
"product_reference": "libncurses6-32bit-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.x86_64"
},
"product_reference": "libncurses6-32bit-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses-devel-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses-devel-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses-devel-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses-devel-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses-devel-32bit-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses-devel-32bit-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses-devel-32bit-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses-devel-32bit-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-static-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses-devel-static-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-static-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses-devel-static-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-static-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses-devel-static-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-static-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses-devel-static-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-examples-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses-examples-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-examples-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses-examples-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-examples-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses-examples-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-examples-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses-examples-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses-utils-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses-utils-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses-utils-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses-utils-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses5-devel-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses5-devel-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses5-devel-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses5-devel-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses5-devel-32bit-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses5-devel-32bit-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-32bit-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses5-devel-32bit-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.aarch64"
},
"product_reference": "ncurses5-devel-static-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.ppc64le"
},
"product_reference": "ncurses5-devel-static-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.s390x"
},
"product_reference": "ncurses5-devel-static-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-static-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.x86_64"
},
"product_reference": "ncurses5-devel-static-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tack-6.3.20220416-16.1.aarch64"
},
"product_reference": "tack-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tack-6.3.20220416-16.1.ppc64le"
},
"product_reference": "tack-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tack-6.3.20220416-16.1.s390x"
},
"product_reference": "tack-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tack-6.3.20220416-16.1.x86_64"
},
"product_reference": "tack-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.aarch64"
},
"product_reference": "terminfo-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.ppc64le"
},
"product_reference": "terminfo-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.s390x"
},
"product_reference": "terminfo-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.x86_64"
},
"product_reference": "terminfo-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.aarch64"
},
"product_reference": "terminfo-base-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.ppc64le"
},
"product_reference": "terminfo-base-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.s390x"
},
"product_reference": "terminfo-base-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.x86_64"
},
"product_reference": "terminfo-base-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.aarch64"
},
"product_reference": "terminfo-iterm-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.ppc64le"
},
"product_reference": "terminfo-iterm-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.s390x"
},
"product_reference": "terminfo-iterm-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.x86_64"
},
"product_reference": "terminfo-iterm-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.3.20220416-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.aarch64"
},
"product_reference": "terminfo-screen-6.3.20220416-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.3.20220416-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.ppc64le"
},
"product_reference": "terminfo-screen-6.3.20220416-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.3.20220416-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.s390x"
},
"product_reference": "terminfo-screen-6.3.20220416-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.3.20220416-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.x86_64"
},
"product_reference": "terminfo-screen-6.3.20220416-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29458"
}
],
"notes": [
{
"category": "general",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29458",
"url": "https://www.suse.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "SUSE Bug 1198627 for CVE-2022-29458",
"url": "https://bugzilla.suse.com/1198627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses5-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses5-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses6-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:libncurses6-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-devel-static-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-examples-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses-utils-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-32bit-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:ncurses5-devel-static-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:tack-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-base-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-iterm-6.3.20220416-16.1.x86_64",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.aarch64",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.ppc64le",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.s390x",
"openSUSE Tumbleweed:terminfo-screen-6.3.20220416-16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-29458"
}
]
}
SUSE-SU-2022:2717-1
Vulnerability from csaf_suse - Published: 2022-08-09 10:54 - Updated: 2022-08-09 10:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ncurses",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ncurses fixes the following issues:\n\n- CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2717,SUSE-SLE-Module-Basesystem-15-SP3-2022-2717,SUSE-SLE-Module-Basesystem-15-SP4-2022-2717,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2717,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2717,SUSE-SLE-Module-Legacy-15-SP3-2022-2717,SUSE-SLE-Module-Legacy-15-SP4-2022-2717,SUSE-SUSE-MicroOS-5.1-2022-2717,SUSE-SUSE-MicroOS-5.2-2022-2717,openSUSE-SLE-15.3-2022-2717,openSUSE-SLE-15.4-2022-2717",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2717-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2717-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222717-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2717-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2022-August/024348.html"
},
{
"category": "self",
"summary": "SUSE Bug 1198627",
"url": "https://bugzilla.suse.com/1198627"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29458 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29458/"
}
],
"title": "Security update for ncurses",
"tracking": {
"current_release_date": "2022-08-09T10:54:40Z",
"generator": {
"date": "2022-08-09T10:54:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2717-1",
"initial_release_date": "2022-08-09T10:54:40Z",
"revision_history": [
{
"date": "2022-08-09T10:54:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.aarch64",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.aarch64",
"product_id": "libncurses5-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.aarch64",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64",
"product_id": "libncurses6-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"product_id": "ncurses-devel-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"product_id": "ncurses-utils-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.aarch64",
"product": {
"name": "tack-6.1-150000.5.12.1.aarch64",
"product_id": "tack-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-base-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-screen-6.1-150000.5.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "libncurses5-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "libncurses5-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libncurses6-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "libncurses6-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "libncurses6-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "ncurses-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "ncurses-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "ncurses-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "ncurses5-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "ncurses5-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.i586",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.i586",
"product_id": "libncurses5-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.i586",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.i586",
"product_id": "libncurses6-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.i586",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.i586",
"product_id": "ncurses-devel-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.i586",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.i586",
"product_id": "ncurses-utils-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.i586",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.i586",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.i586",
"product": {
"name": "tack-6.1-150000.5.12.1.i586",
"product_id": "tack-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-6.1-150000.5.12.1.i586",
"product_id": "terminfo-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.i586",
"product_id": "terminfo-base-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.i586",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.i586",
"product_id": "terminfo-screen-6.1-150000.5.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.ppc64le",
"product_id": "libncurses5-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.ppc64le",
"product_id": "libncurses6-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"product_id": "ncurses-devel-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"product_id": "ncurses-utils-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "tack-6.1-150000.5.12.1.ppc64le",
"product_id": "tack-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-base-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-screen-6.1-150000.5.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.s390x",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.s390x",
"product_id": "libncurses5-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.s390x",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.s390x",
"product_id": "libncurses6-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.s390x",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.s390x",
"product_id": "ncurses-devel-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.s390x",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x",
"product_id": "ncurses-utils-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.s390x",
"product": {
"name": "tack-6.1-150000.5.12.1.s390x",
"product_id": "tack-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-base-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-screen-6.1-150000.5.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses5-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses5-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses6-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses6-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses-devel-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses-utils-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.x86_64",
"product": {
"name": "tack-6.1-150000.5.12.1.x86_64",
"product_id": "tack-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-base-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-screen-6.1-150000.5.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.aarch64"
},
"product_reference": "tack-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "tack-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.s390x"
},
"product_reference": "tack-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.x86_64"
},
"product_reference": "tack-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.aarch64"
},
"product_reference": "tack-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "tack-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.s390x"
},
"product_reference": "tack-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.x86_64"
},
"product_reference": "tack-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses5-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libncurses6-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:tack-6.1-150000.5.12.1.aarch64"
},
"product_reference": "tack-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:tack-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "tack-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:tack-6.1-150000.5.12.1.s390x"
},
"product_reference": "tack-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:tack-6.1-150000.5.12.1.x86_64"
},
"product_reference": "tack-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses5-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.s390x"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libncurses6-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.s390x"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tack-6.1-150000.5.12.1.aarch64"
},
"product_reference": "tack-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tack-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "tack-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tack-6.1-150000.5.12.1.s390x"
},
"product_reference": "tack-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tack-6.1-150000.5.12.1.x86_64"
},
"product_reference": "tack-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.ppc64le"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.s390x"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29458"
}
],
"notes": [
{
"category": "general",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29458",
"url": "https://www.suse.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "SUSE Bug 1198627 for CVE-2022-29458",
"url": "https://bugzilla.suse.com/1198627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.1:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:tack-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:terminfo-screen-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libncurses6-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:ncurses-utils-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:tack-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-base-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:terminfo-screen-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:libncurses5-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:libncurses5-6.1-150000.5.12.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:libncurses5-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:tack-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-base-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.3:terminfo-screen-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:libncurses5-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:ncurses5-devel-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:tack-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-base-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-iterm-6.1-150000.5.12.1.x86_64",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.aarch64",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.ppc64le",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.s390x",
"openSUSE Leap 15.4:terminfo-screen-6.1-150000.5.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-09T10:54:40Z",
"details": "moderate"
}
],
"title": "CVE-2022-29458"
}
]
}
SUSE-SU-2022:2717-2
Vulnerability from csaf_suse - Published: 2022-08-09 10:54 - Updated: 2022-08-09 10:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ncurses",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ncurses fixes the following issues:\n\n- CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2717,openSUSE-Leap-Micro-5.2-2022-2717",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2717-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2717-2",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222717-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2717-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012045.html"
},
{
"category": "self",
"summary": "SUSE Bug 1198627",
"url": "https://bugzilla.suse.com/1198627"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29458 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29458/"
}
],
"title": "Security update for ncurses",
"tracking": {
"current_release_date": "2022-08-09T10:54:44Z",
"generator": {
"date": "2022-08-09T10:54:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2717-2",
"initial_release_date": "2022-08-09T10:54:44Z",
"revision_history": [
{
"date": "2022-08-09T10:54:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.aarch64",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.aarch64",
"product_id": "libncurses5-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.aarch64",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64",
"product_id": "libncurses6-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.aarch64",
"product_id": "ncurses-devel-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"product_id": "ncurses-utils-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.aarch64",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.aarch64",
"product": {
"name": "tack-6.1-150000.5.12.1.aarch64",
"product_id": "tack-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-base-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.aarch64",
"product_id": "terminfo-screen-6.1-150000.5.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "libncurses5-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "libncurses5-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libncurses6-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "libncurses6-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "libncurses6-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "ncurses-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "ncurses-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "ncurses-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product": {
"name": "ncurses5-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32",
"product_id": "ncurses5-devel-64bit-6.1-150000.5.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.i586",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.i586",
"product_id": "libncurses5-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.i586",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.i586",
"product_id": "libncurses6-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.i586",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.i586",
"product_id": "ncurses-devel-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.i586",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.i586",
"product_id": "ncurses-utils-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.i586",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.i586",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.i586",
"product": {
"name": "tack-6.1-150000.5.12.1.i586",
"product_id": "tack-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-6.1-150000.5.12.1.i586",
"product_id": "terminfo-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.i586",
"product_id": "terminfo-base-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.i586",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.i586",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.i586",
"product_id": "terminfo-screen-6.1-150000.5.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.ppc64le",
"product_id": "libncurses5-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.ppc64le",
"product_id": "libncurses6-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.ppc64le",
"product_id": "ncurses-devel-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.ppc64le",
"product_id": "ncurses-utils-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.ppc64le",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "tack-6.1-150000.5.12.1.ppc64le",
"product_id": "tack-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-base-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.ppc64le",
"product_id": "terminfo-screen-6.1-150000.5.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.s390x",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.s390x",
"product_id": "libncurses5-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.s390x",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.s390x",
"product_id": "libncurses6-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.s390x",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.s390x",
"product_id": "ncurses-devel-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.s390x",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.s390x",
"product_id": "ncurses-utils-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.s390x",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.s390x",
"product": {
"name": "tack-6.1-150000.5.12.1.s390x",
"product_id": "tack-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-base-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.s390x",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.s390x",
"product_id": "terminfo-screen-6.1-150000.5.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses5-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses5-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses5-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses5-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses6-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "libncurses6-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "libncurses6-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses-devel-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses-devel-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses-devel-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses-utils-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses5-devel-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses5-devel-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"product": {
"name": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64",
"product_id": "ncurses5-devel-32bit-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "tack-6.1-150000.5.12.1.x86_64",
"product": {
"name": "tack-6.1-150000.5.12.1.x86_64",
"product_id": "tack-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-base-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-base-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-iterm-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-iterm-6.1-150000.5.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"product": {
"name": "terminfo-screen-6.1-150000.5.12.1.x86_64",
"product_id": "terminfo-screen-6.1-150000.5.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64"
},
"product_reference": "libncurses6-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64"
},
"product_reference": "ncurses-utils-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-6.1-150000.5.12.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64"
},
"product_reference": "terminfo-base-6.1-150000.5.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29458"
}
],
"notes": [
{
"category": "general",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29458",
"url": "https://www.suse.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "SUSE Bug 1198627 for CVE-2022-29458",
"url": "https://bugzilla.suse.com/1198627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:libncurses6-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:ncurses-utils-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:terminfo-6.1-150000.5.12.1.x86_64",
"openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.aarch64",
"openSUSE Leap Micro 5.2:terminfo-base-6.1-150000.5.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-09T10:54:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-29458"
}
]
}
SUSE-SU-2022:2718-1
Vulnerability from csaf_suse - Published: 2022-08-09 10:55 - Updated: 2022-08-09 10:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ncurses",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ncurses fixes the following issues:\n\n- CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2718,SUSE-SLE-SDK-12-SP5-2022-2718,SUSE-SLE-SERVER-12-SP5-2022-2718",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2718-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2718-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222718-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2718-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011831.html"
},
{
"category": "self",
"summary": "SUSE Bug 1198627",
"url": "https://bugzilla.suse.com/1198627"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29458 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29458/"
}
],
"title": "Security update for ncurses",
"tracking": {
"current_release_date": "2022-08-09T10:55:01Z",
"generator": {
"date": "2022-08-09T10:55:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2718-1",
"initial_release_date": "2022-08-09T10:55:01Z",
"revision_history": [
{
"date": "2022-08-09T10:55:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-5.9-78.1.aarch64",
"product": {
"name": "libncurses5-5.9-78.1.aarch64",
"product_id": "libncurses5-5.9-78.1.aarch64"
}
},
{
"category": "product_version",
"name": "libncurses6-5.9-78.1.aarch64",
"product": {
"name": "libncurses6-5.9-78.1.aarch64",
"product_id": "libncurses6-5.9-78.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-5.9-78.1.aarch64",
"product": {
"name": "ncurses-devel-5.9-78.1.aarch64",
"product_id": "ncurses-devel-5.9-78.1.aarch64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-5.9-78.1.aarch64",
"product": {
"name": "ncurses-utils-5.9-78.1.aarch64",
"product_id": "ncurses-utils-5.9-78.1.aarch64"
}
},
{
"category": "product_version",
"name": "tack-5.9-78.1.aarch64",
"product": {
"name": "tack-5.9-78.1.aarch64",
"product_id": "tack-5.9-78.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-5.9-78.1.aarch64",
"product": {
"name": "terminfo-5.9-78.1.aarch64",
"product_id": "terminfo-5.9-78.1.aarch64"
}
},
{
"category": "product_version",
"name": "terminfo-base-5.9-78.1.aarch64",
"product": {
"name": "terminfo-base-5.9-78.1.aarch64",
"product_id": "terminfo-base-5.9-78.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-64bit-5.9-78.1.aarch64_ilp32",
"product": {
"name": "libncurses5-64bit-5.9-78.1.aarch64_ilp32",
"product_id": "libncurses5-64bit-5.9-78.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libncurses6-64bit-5.9-78.1.aarch64_ilp32",
"product": {
"name": "libncurses6-64bit-5.9-78.1.aarch64_ilp32",
"product_id": "libncurses6-64bit-5.9-78.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "ncurses-devel-64bit-5.9-78.1.aarch64_ilp32",
"product": {
"name": "ncurses-devel-64bit-5.9-78.1.aarch64_ilp32",
"product_id": "ncurses-devel-64bit-5.9-78.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-5.9-78.1.i586",
"product": {
"name": "libncurses5-5.9-78.1.i586",
"product_id": "libncurses5-5.9-78.1.i586"
}
},
{
"category": "product_version",
"name": "libncurses6-5.9-78.1.i586",
"product": {
"name": "libncurses6-5.9-78.1.i586",
"product_id": "libncurses6-5.9-78.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses-devel-5.9-78.1.i586",
"product": {
"name": "ncurses-devel-5.9-78.1.i586",
"product_id": "ncurses-devel-5.9-78.1.i586"
}
},
{
"category": "product_version",
"name": "ncurses-utils-5.9-78.1.i586",
"product": {
"name": "ncurses-utils-5.9-78.1.i586",
"product_id": "ncurses-utils-5.9-78.1.i586"
}
},
{
"category": "product_version",
"name": "tack-5.9-78.1.i586",
"product": {
"name": "tack-5.9-78.1.i586",
"product_id": "tack-5.9-78.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-5.9-78.1.i586",
"product": {
"name": "terminfo-5.9-78.1.i586",
"product_id": "terminfo-5.9-78.1.i586"
}
},
{
"category": "product_version",
"name": "terminfo-base-5.9-78.1.i586",
"product": {
"name": "terminfo-base-5.9-78.1.i586",
"product_id": "terminfo-base-5.9-78.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-5.9-78.1.ppc64le",
"product": {
"name": "libncurses5-5.9-78.1.ppc64le",
"product_id": "libncurses5-5.9-78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libncurses6-5.9-78.1.ppc64le",
"product": {
"name": "libncurses6-5.9-78.1.ppc64le",
"product_id": "libncurses6-5.9-78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-devel-5.9-78.1.ppc64le",
"product": {
"name": "ncurses-devel-5.9-78.1.ppc64le",
"product_id": "ncurses-devel-5.9-78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ncurses-utils-5.9-78.1.ppc64le",
"product": {
"name": "ncurses-utils-5.9-78.1.ppc64le",
"product_id": "ncurses-utils-5.9-78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tack-5.9-78.1.ppc64le",
"product": {
"name": "tack-5.9-78.1.ppc64le",
"product_id": "tack-5.9-78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-5.9-78.1.ppc64le",
"product": {
"name": "terminfo-5.9-78.1.ppc64le",
"product_id": "terminfo-5.9-78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "terminfo-base-5.9-78.1.ppc64le",
"product": {
"name": "terminfo-base-5.9-78.1.ppc64le",
"product_id": "terminfo-base-5.9-78.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-5.9-78.1.s390",
"product": {
"name": "libncurses5-5.9-78.1.s390",
"product_id": "libncurses5-5.9-78.1.s390"
}
},
{
"category": "product_version",
"name": "libncurses6-5.9-78.1.s390",
"product": {
"name": "libncurses6-5.9-78.1.s390",
"product_id": "libncurses6-5.9-78.1.s390"
}
},
{
"category": "product_version",
"name": "ncurses-devel-5.9-78.1.s390",
"product": {
"name": "ncurses-devel-5.9-78.1.s390",
"product_id": "ncurses-devel-5.9-78.1.s390"
}
},
{
"category": "product_version",
"name": "ncurses-utils-5.9-78.1.s390",
"product": {
"name": "ncurses-utils-5.9-78.1.s390",
"product_id": "ncurses-utils-5.9-78.1.s390"
}
},
{
"category": "product_version",
"name": "tack-5.9-78.1.s390",
"product": {
"name": "tack-5.9-78.1.s390",
"product_id": "tack-5.9-78.1.s390"
}
},
{
"category": "product_version",
"name": "terminfo-5.9-78.1.s390",
"product": {
"name": "terminfo-5.9-78.1.s390",
"product_id": "terminfo-5.9-78.1.s390"
}
},
{
"category": "product_version",
"name": "terminfo-base-5.9-78.1.s390",
"product": {
"name": "terminfo-base-5.9-78.1.s390",
"product_id": "terminfo-base-5.9-78.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-5.9-78.1.s390x",
"product": {
"name": "libncurses5-5.9-78.1.s390x",
"product_id": "libncurses5-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-5.9-78.1.s390x",
"product": {
"name": "libncurses5-32bit-5.9-78.1.s390x",
"product_id": "libncurses5-32bit-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses6-5.9-78.1.s390x",
"product": {
"name": "libncurses6-5.9-78.1.s390x",
"product_id": "libncurses6-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-5.9-78.1.s390x",
"product": {
"name": "libncurses6-32bit-5.9-78.1.s390x",
"product_id": "libncurses6-32bit-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-devel-5.9-78.1.s390x",
"product": {
"name": "ncurses-devel-5.9-78.1.s390x",
"product_id": "ncurses-devel-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-5.9-78.1.s390x",
"product": {
"name": "ncurses-devel-32bit-5.9-78.1.s390x",
"product_id": "ncurses-devel-32bit-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "ncurses-utils-5.9-78.1.s390x",
"product": {
"name": "ncurses-utils-5.9-78.1.s390x",
"product_id": "ncurses-utils-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "tack-5.9-78.1.s390x",
"product": {
"name": "tack-5.9-78.1.s390x",
"product_id": "tack-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-5.9-78.1.s390x",
"product": {
"name": "terminfo-5.9-78.1.s390x",
"product_id": "terminfo-5.9-78.1.s390x"
}
},
{
"category": "product_version",
"name": "terminfo-base-5.9-78.1.s390x",
"product": {
"name": "terminfo-base-5.9-78.1.s390x",
"product_id": "terminfo-base-5.9-78.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libncurses5-5.9-78.1.x86_64",
"product": {
"name": "libncurses5-5.9-78.1.x86_64",
"product_id": "libncurses5-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses5-32bit-5.9-78.1.x86_64",
"product": {
"name": "libncurses5-32bit-5.9-78.1.x86_64",
"product_id": "libncurses5-32bit-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-5.9-78.1.x86_64",
"product": {
"name": "libncurses6-5.9-78.1.x86_64",
"product_id": "libncurses6-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "libncurses6-32bit-5.9-78.1.x86_64",
"product": {
"name": "libncurses6-32bit-5.9-78.1.x86_64",
"product_id": "libncurses6-32bit-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-5.9-78.1.x86_64",
"product": {
"name": "ncurses-devel-5.9-78.1.x86_64",
"product_id": "ncurses-devel-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-devel-32bit-5.9-78.1.x86_64",
"product": {
"name": "ncurses-devel-32bit-5.9-78.1.x86_64",
"product_id": "ncurses-devel-32bit-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "ncurses-utils-5.9-78.1.x86_64",
"product": {
"name": "ncurses-utils-5.9-78.1.x86_64",
"product_id": "ncurses-utils-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "tack-5.9-78.1.x86_64",
"product": {
"name": "tack-5.9-78.1.x86_64",
"product_id": "tack-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-5.9-78.1.x86_64",
"product": {
"name": "terminfo-5.9-78.1.x86_64",
"product_id": "terminfo-5.9-78.1.x86_64"
}
},
{
"category": "product_version",
"name": "terminfo-base-5.9-78.1.x86_64",
"product": {
"name": "terminfo-base-5.9-78.1.x86_64",
"product_id": "terminfo-base-5.9-78.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.aarch64"
},
"product_reference": "ncurses-devel-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.ppc64le"
},
"product_reference": "ncurses-devel-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.s390x"
},
"product_reference": "ncurses-devel-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.x86_64"
},
"product_reference": "ncurses-devel-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.aarch64"
},
"product_reference": "libncurses5-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.ppc64le"
},
"product_reference": "libncurses5-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.s390x"
},
"product_reference": "libncurses5-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.x86_64"
},
"product_reference": "libncurses5-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.s390x"
},
"product_reference": "libncurses5-32bit-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.x86_64"
},
"product_reference": "libncurses5-32bit-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.aarch64"
},
"product_reference": "libncurses6-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.ppc64le"
},
"product_reference": "libncurses6-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.s390x"
},
"product_reference": "libncurses6-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.x86_64"
},
"product_reference": "libncurses6-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.s390x"
},
"product_reference": "libncurses6-32bit-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.x86_64"
},
"product_reference": "libncurses6-32bit-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.aarch64"
},
"product_reference": "ncurses-devel-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.ppc64le"
},
"product_reference": "ncurses-devel-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.s390x"
},
"product_reference": "ncurses-devel-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.x86_64"
},
"product_reference": "ncurses-devel-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x"
},
"product_reference": "ncurses-devel-32bit-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64"
},
"product_reference": "ncurses-devel-32bit-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.aarch64"
},
"product_reference": "ncurses-utils-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.ppc64le"
},
"product_reference": "ncurses-utils-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.s390x"
},
"product_reference": "ncurses-utils-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.x86_64"
},
"product_reference": "ncurses-utils-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.aarch64"
},
"product_reference": "tack-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.ppc64le"
},
"product_reference": "tack-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.s390x"
},
"product_reference": "tack-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.x86_64"
},
"product_reference": "tack-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.aarch64"
},
"product_reference": "terminfo-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.ppc64le"
},
"product_reference": "terminfo-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.s390x"
},
"product_reference": "terminfo-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.x86_64"
},
"product_reference": "terminfo-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.aarch64"
},
"product_reference": "terminfo-base-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.ppc64le"
},
"product_reference": "terminfo-base-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.s390x"
},
"product_reference": "terminfo-base-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.x86_64"
},
"product_reference": "terminfo-base-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.aarch64"
},
"product_reference": "libncurses5-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.ppc64le"
},
"product_reference": "libncurses5-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.s390x"
},
"product_reference": "libncurses5-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.x86_64"
},
"product_reference": "libncurses5-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.s390x"
},
"product_reference": "libncurses5-32bit-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses5-32bit-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.x86_64"
},
"product_reference": "libncurses5-32bit-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.aarch64"
},
"product_reference": "libncurses6-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.ppc64le"
},
"product_reference": "libncurses6-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.s390x"
},
"product_reference": "libncurses6-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.x86_64"
},
"product_reference": "libncurses6-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.s390x"
},
"product_reference": "libncurses6-32bit-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libncurses6-32bit-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.x86_64"
},
"product_reference": "libncurses6-32bit-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.aarch64"
},
"product_reference": "ncurses-devel-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.ppc64le"
},
"product_reference": "ncurses-devel-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.s390x"
},
"product_reference": "ncurses-devel-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.x86_64"
},
"product_reference": "ncurses-devel-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x"
},
"product_reference": "ncurses-devel-32bit-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-32bit-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64"
},
"product_reference": "ncurses-devel-32bit-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.aarch64"
},
"product_reference": "ncurses-utils-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.ppc64le"
},
"product_reference": "ncurses-utils-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.s390x"
},
"product_reference": "ncurses-utils-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-utils-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.x86_64"
},
"product_reference": "ncurses-utils-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.aarch64"
},
"product_reference": "tack-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.ppc64le"
},
"product_reference": "tack-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.s390x"
},
"product_reference": "tack-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tack-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.x86_64"
},
"product_reference": "tack-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.aarch64"
},
"product_reference": "terminfo-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.ppc64le"
},
"product_reference": "terminfo-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.s390x"
},
"product_reference": "terminfo-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.x86_64"
},
"product_reference": "terminfo-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.aarch64"
},
"product_reference": "terminfo-base-5.9-78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.ppc64le"
},
"product_reference": "terminfo-base-5.9-78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.s390x"
},
"product_reference": "terminfo-base-5.9-78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "terminfo-base-5.9-78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.x86_64"
},
"product_reference": "terminfo-base-5.9-78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29458"
}
],
"notes": [
{
"category": "general",
"text": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29458",
"url": "https://www.suse.com/security/cve/CVE-2022-29458"
},
{
"category": "external",
"summary": "SUSE Bug 1198627 for CVE-2022-29458",
"url": "https://bugzilla.suse.com/1198627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses5-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libncurses6-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-devel-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:ncurses-utils-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tack-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:terminfo-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:terminfo-base-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-5.9-78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base-5.9-78.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:ncurses-devel-5.9-78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-09T10:55:01Z",
"details": "moderate"
}
],
"title": "CVE-2022-29458"
}
]
}
GHSA-JH4F-5J2M-4V9C
Vulnerability from github – Published: 2022-04-19 00:00 – Updated: 2025-06-09 15:31ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.
{
"affected": [],
"aliases": [
"CVE-2022-29458"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-04-18T21:15:00Z",
"severity": "HIGH"
},
"details": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"id": "GHSA-jh4f-5j2m-4v9c",
"modified": "2025-06-09T15:31:33Z",
"published": "2022-04-19T00:00:47Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29458"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"type": "WEB",
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"type": "WEB",
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT213488"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-29458
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-29458",
"description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"id": "GSD-2022-29458",
"references": [
"https://www.suse.com/security/cve/CVE-2022-29458.html",
"https://ubuntu.com/security/CVE-2022-29458"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-29458"
],
"details": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"id": "GSD-2022-29458",
"modified": "2023-12-13T01:19:41.796506Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-29458",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"name": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"name": "https://support.apple.com/kb/HT213488",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c6.3",
"affected_versions": "All versions before 6.3",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-125",
"CWE-937"
],
"date": "2022-11-08",
"description": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.",
"fixed_versions": [
"6.3"
],
"identifier": "CVE-2022-29458",
"identifiers": [
"CVE-2022-29458"
],
"not_impacted": "All versions starting from 6.3",
"package_slug": "conan/ncurses",
"pubdate": "2022-04-18",
"solution": "Upgrade to version 6.3 or above.",
"title": "Out-of-bounds Read",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-29458",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
],
"uuid": "811d4c05-ffe3-48f3-9ae0-3484d7d6ff69"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:ncurses:6.3:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-29458"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html",
"refsource": "MISC",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"name": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"name": "https://support.apple.com/kb/HT213488",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"refsource": "FULLDISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
},
"lastModifiedDate": "2022-11-08T19:46Z",
"publishedDate": "2022-04-18T21:15Z"
}
}
}
FKIE_CVE-2022-29458
Vulnerability from fkie_nvd - Published: 2022-04-18 21:15 - Updated: 2025-06-09 15:157.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://seclists.org/fulldisclosure/2022/Oct/28 | ||
| cve@mitre.org | http://seclists.org/fulldisclosure/2022/Oct/41 | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html | Exploit, Mailing List, Vendor Advisory | |
| cve@mitre.org | https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html | Mailing List, Vendor Advisory | |
| cve@mitre.org | https://support.apple.com/kb/HT213488 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2022/Oct/28 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2022/Oct/41 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html | Exploit, Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html | Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213488 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B88F4454-235A-475C-BFA0-6C47F3947647",
"versionEndExcluding": "6.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:ncurses:6.3:-:*:*:*:*:*:*",
"matchCriteriaId": "9ABD93AB-A515-4191-A13D-AA45A379CBDF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC",
"versionEndExcluding": "13.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library."
},
{
"lang": "es",
"value": "ncurses versiones 6.3 anteriores al parche 20220416, presentan una lectura fuera de l\u00edmites y una violaci\u00f3n de segmentaci\u00f3n en el archivo convert_strings en tinfo/read_entry.c en la biblioteca terminfo"
}
],
"id": "CVE-2022-29458",
"lastModified": "2025-06-09T15:15:27.430",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-04-18T21:15:07.600",
"references": [
{
"source": "cve@mitre.org",
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213488"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213488"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
VAR-202204-0632
Vulnerability from variot - Updated: 2023-12-18 10:47ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library. ncurses Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. (CVE-2019-17594). ========================================================================== Ubuntu Security Notice USN-6099-1 May 23, 2023
ncurses vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in ncurses.
Software Description: - ncurses: shared libraries for terminal handling
Details:
It was discovered that ncurses was incorrectly performing bounds checks when processing invalid hashcodes. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-17594)
It was discovered that ncurses was incorrectly handling end-of-string characters when processing terminfo and termcap files. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-17595)
It was discovered that ncurses was incorrectly handling end-of-string characters when converting between termcap and terminfo formats. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-39537)
It was discovered that ncurses was incorrectly performing bounds checks when dealing with corrupt terminfo data while reading a terminfo file. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-29458)
It was discovered that ncurses was parsing environment variables when running with setuid applications and not properly handling the processing of malformed data when doing so. A local attacker could possibly use this issue to cause a denial of service (application crash) or execute arbitrary code. (CVE-2023-29491)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04: lib32ncurses6 6.4-2ubuntu0.1 lib32ncursesw6 6.4-2ubuntu0.1 lib32tinfo6 6.4-2ubuntu0.1 lib64ncurses6 6.4-2ubuntu0.1 lib64ncursesw6 6.4-2ubuntu0.1 lib64tinfo6 6.4-2ubuntu0.1 libncurses5 6.4-2ubuntu0.1 libncurses6 6.4-2ubuntu0.1 libncursesw5 6.4-2ubuntu0.1 libncursesw6 6.4-2ubuntu0.1 libtinfo5 6.4-2ubuntu0.1 libtinfo6 6.4-2ubuntu0.1 ncurses-bin 6.4-2ubuntu0.1
Ubuntu 22.10: lib32ncurses6 6.3+20220423-2ubuntu0.1 lib32ncursesw6 6.3+20220423-2ubuntu0.1 lib32tinfo6 6.3+20220423-2ubuntu0.1 lib64ncurses6 6.3+20220423-2ubuntu0.1 lib64ncursesw6 6.3+20220423-2ubuntu0.1 lib64tinfo6 6.3+20220423-2ubuntu0.1 libncurses5 6.3+20220423-2ubuntu0.1 libncurses6 6.3+20220423-2ubuntu0.1 libncursesw5 6.3+20220423-2ubuntu0.1 libncursesw6 6.3+20220423-2ubuntu0.1 libtinfo5 6.3+20220423-2ubuntu0.1 libtinfo6 6.3+20220423-2ubuntu0.1 ncurses-bin 6.3+20220423-2ubuntu0.1
Ubuntu 22.04 LTS: lib32ncurses6 6.3-2ubuntu0.1 lib32ncursesw6 6.3-2ubuntu0.1 lib32tinfo6 6.3-2ubuntu0.1 lib64ncurses6 6.3-2ubuntu0.1 lib64ncursesw6 6.3-2ubuntu0.1 lib64tinfo6 6.3-2ubuntu0.1 libncurses5 6.3-2ubuntu0.1 libncurses6 6.3-2ubuntu0.1 libncursesw5 6.3-2ubuntu0.1 libncursesw6 6.3-2ubuntu0.1 libtinfo5 6.3-2ubuntu0.1 libtinfo6 6.3-2ubuntu0.1 ncurses-bin 6.3-2ubuntu0.1
Ubuntu 20.04 LTS: lib32ncurses6 6.2-0ubuntu2.1 lib32ncursesw6 6.2-0ubuntu2.1 lib32tinfo6 6.2-0ubuntu2.1 lib64ncurses6 6.2-0ubuntu2.1 lib64ncursesw6 6.2-0ubuntu2.1 lib64tinfo6 6.2-0ubuntu2.1 libncurses5 6.2-0ubuntu2.1 libncurses6 6.2-0ubuntu2.1 libncursesw5 6.2-0ubuntu2.1 libncursesw6 6.2-0ubuntu2.1 libtinfo5 6.2-0ubuntu2.1 libtinfo6 6.2-0ubuntu2.1 ncurses-bin 6.2-0ubuntu2.1
Ubuntu 18.04 LTS: lib32ncurses5 6.1-1ubuntu1.18.04.1 lib32ncursesw5 6.1-1ubuntu1.18.04.1 lib32tinfo5 6.1-1ubuntu1.18.04.1 lib64ncurses5 6.1-1ubuntu1.18.04.1 lib64tinfo5 6.1-1ubuntu1.18.04.1 libncurses5 6.1-1ubuntu1.18.04.1 libncursesw5 6.1-1ubuntu1.18.04.1 libtinfo5 6.1-1ubuntu1.18.04.1 libx32ncurses5 6.1-1ubuntu1.18.04.1 libx32ncursesw5 6.1-1ubuntu1.18.04.1 libx32tinfo5 6.1-1ubuntu1.18.04.1 ncurses-bin 6.1-1ubuntu1.18.04.1
Ubuntu 16.04 LTS (Available with Ubuntu Pro): lib32ncurses5 6.0+20160213-1ubuntu1+esm3 lib32ncursesw5 6.0+20160213-1ubuntu1+esm3 lib32tinfo5 6.0+20160213-1ubuntu1+esm3 lib64ncurses5 6.0+20160213-1ubuntu1+esm3 lib64tinfo5 6.0+20160213-1ubuntu1+esm3 libncurses5 6.0+20160213-1ubuntu1+esm3 libncursesw5 6.0+20160213-1ubuntu1+esm3 libtinfo5 6.0+20160213-1ubuntu1+esm3 libx32ncurses5 6.0+20160213-1ubuntu1+esm3 libx32ncursesw5 6.0+20160213-1ubuntu1+esm3 libx32tinfo5 6.0+20160213-1ubuntu1+esm3 ncurses-bin 6.0+20160213-1ubuntu1+esm3
Ubuntu 14.04 LTS (Available with Ubuntu Pro): lib32ncurses5 5.9+20140118-1ubuntu1+esm3 lib32ncursesw5 5.9+20140118-1ubuntu1+esm3 lib32tinfo5 5.9+20140118-1ubuntu1+esm3 lib64ncurses5 5.9+20140118-1ubuntu1+esm3 lib64tinfo5 5.9+20140118-1ubuntu1+esm3 libncurses5 5.9+20140118-1ubuntu1+esm3 libncursesw5 5.9+20140118-1ubuntu1+esm3 libtinfo5 5.9+20140118-1ubuntu1+esm3 libx32ncurses5 5.9+20140118-1ubuntu1+esm3 libx32ncursesw5 5.9+20140118-1ubuntu1+esm3 libx32tinfo5 5.9+20140118-1ubuntu1+esm3 ncurses-bin 5.9+20140118-1ubuntu1+esm3
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6099-1 CVE-2019-17594, CVE-2019-17595, CVE-2021-39537, CVE-2022-29458, CVE-2023-29491
Package Information: https://launchpad.net/ubuntu/+source/ncurses/6.4-2ubuntu0.1 https://launchpad.net/ubuntu/+source/ncurses/6.3+20220423-2ubuntu0.1 https://launchpad.net/ubuntu/+source/ncurses/6.3-2ubuntu0.1 https://launchpad.net/ubuntu/+source/ncurses/6.2-0ubuntu2.1 https://launchpad.net/ubuntu/+source/ncurses/6.1-1ubuntu1.18.04.1
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202204-0632",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "10.0"
},
{
"model": "ncurses",
"scope": "lt",
"trust": 1.0,
"vendor": "gnu",
"version": "6.3"
},
{
"model": "ncurses",
"scope": "eq",
"trust": 1.0,
"vendor": "gnu",
"version": "6.3"
},
{
"model": "macos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "13.0"
},
{
"model": "ncurses",
"scope": null,
"trust": 0.8,
"vendor": "gnu",
"version": null
},
{
"model": "macos",
"scope": null,
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
},
{
"model": "gnu/linux",
"scope": null,
"trust": 0.8,
"vendor": "debian",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"db": "NVD",
"id": "CVE-2022-29458"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:ncurses:6.3:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-29458"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ubuntu",
"sources": [
{
"db": "PACKETSTORM",
"id": "167488"
},
{
"db": "PACKETSTORM",
"id": "172500"
}
],
"trust": 0.2
},
"cve": "CVE-2022-29458",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2022-29458",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-420992",
"impactScore": 4.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.1,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-29458",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2022-29458",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202204-3736",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-420992",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2022-29458",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-420992"
},
{
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"db": "NVD",
"id": "CVE-2022-29458"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library. ncurses Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. (CVE-2019-17594). ==========================================================================\nUbuntu Security Notice USN-6099-1\nMay 23, 2023\n\nncurses vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 23.04\n- Ubuntu 22.10\n- Ubuntu 22.04 LTS\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS (Available with Ubuntu Pro)\n- Ubuntu 14.04 LTS (Available with Ubuntu Pro)\n\nSummary:\n\nSeveral security issues were fixed in ncurses. \n\nSoftware Description:\n- ncurses: shared libraries for terminal handling\n\nDetails:\n\nIt was discovered that ncurses was incorrectly performing bounds\nchecks when processing invalid hashcodes. An attacker could possibly\nuse this issue to cause a denial of service or to expose sensitive\ninformation. This issue only affected Ubuntu 18.04 LTS. \n(CVE-2019-17594)\n\nIt was discovered that ncurses was incorrectly handling\nend-of-string characters when processing terminfo and termcap files. \nAn attacker could possibly use this issue to cause a denial of\nservice or to expose sensitive information. This issue only affected\nUbuntu 18.04 LTS. (CVE-2019-17595)\n\nIt was discovered that ncurses was incorrectly handling\nend-of-string characters when converting between termcap and\nterminfo formats. An attacker could possibly use this issue to cause\na denial of service or execute arbitrary code. This issue only\naffected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-39537)\n\nIt was discovered that ncurses was incorrectly performing bounds\nchecks when dealing with corrupt terminfo data while reading a\nterminfo file. An attacker could possibly use this issue to cause a\ndenial of service or to expose sensitive information. This issue only\naffected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. \n(CVE-2022-29458)\n\nIt was discovered that ncurses was parsing environment variables when\nrunning with setuid applications and not properly handling the\nprocessing of malformed data when doing so. A local attacker could\npossibly use this issue to cause a denial of service (application\ncrash) or execute arbitrary code. (CVE-2023-29491)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 23.04:\n lib32ncurses6 6.4-2ubuntu0.1\n lib32ncursesw6 6.4-2ubuntu0.1\n lib32tinfo6 6.4-2ubuntu0.1\n lib64ncurses6 6.4-2ubuntu0.1\n lib64ncursesw6 6.4-2ubuntu0.1\n lib64tinfo6 6.4-2ubuntu0.1\n libncurses5 6.4-2ubuntu0.1\n libncurses6 6.4-2ubuntu0.1\n libncursesw5 6.4-2ubuntu0.1\n libncursesw6 6.4-2ubuntu0.1\n libtinfo5 6.4-2ubuntu0.1\n libtinfo6 6.4-2ubuntu0.1\n ncurses-bin 6.4-2ubuntu0.1\n\nUbuntu 22.10:\n lib32ncurses6 6.3+20220423-2ubuntu0.1\n lib32ncursesw6 6.3+20220423-2ubuntu0.1\n lib32tinfo6 6.3+20220423-2ubuntu0.1\n lib64ncurses6 6.3+20220423-2ubuntu0.1\n lib64ncursesw6 6.3+20220423-2ubuntu0.1\n lib64tinfo6 6.3+20220423-2ubuntu0.1\n libncurses5 6.3+20220423-2ubuntu0.1\n libncurses6 6.3+20220423-2ubuntu0.1\n libncursesw5 6.3+20220423-2ubuntu0.1\n libncursesw6 6.3+20220423-2ubuntu0.1\n libtinfo5 6.3+20220423-2ubuntu0.1\n libtinfo6 6.3+20220423-2ubuntu0.1\n ncurses-bin 6.3+20220423-2ubuntu0.1\n\nUbuntu 22.04 LTS:\n lib32ncurses6 6.3-2ubuntu0.1\n lib32ncursesw6 6.3-2ubuntu0.1\n lib32tinfo6 6.3-2ubuntu0.1\n lib64ncurses6 6.3-2ubuntu0.1\n lib64ncursesw6 6.3-2ubuntu0.1\n lib64tinfo6 6.3-2ubuntu0.1\n libncurses5 6.3-2ubuntu0.1\n libncurses6 6.3-2ubuntu0.1\n libncursesw5 6.3-2ubuntu0.1\n libncursesw6 6.3-2ubuntu0.1\n libtinfo5 6.3-2ubuntu0.1\n libtinfo6 6.3-2ubuntu0.1\n ncurses-bin 6.3-2ubuntu0.1\n\nUbuntu 20.04 LTS:\n lib32ncurses6 6.2-0ubuntu2.1\n lib32ncursesw6 6.2-0ubuntu2.1\n lib32tinfo6 6.2-0ubuntu2.1\n lib64ncurses6 6.2-0ubuntu2.1\n lib64ncursesw6 6.2-0ubuntu2.1\n lib64tinfo6 6.2-0ubuntu2.1\n libncurses5 6.2-0ubuntu2.1\n libncurses6 6.2-0ubuntu2.1\n libncursesw5 6.2-0ubuntu2.1\n libncursesw6 6.2-0ubuntu2.1\n libtinfo5 6.2-0ubuntu2.1\n libtinfo6 6.2-0ubuntu2.1\n ncurses-bin 6.2-0ubuntu2.1\n\nUbuntu 18.04 LTS:\n lib32ncurses5 6.1-1ubuntu1.18.04.1\n lib32ncursesw5 6.1-1ubuntu1.18.04.1\n lib32tinfo5 6.1-1ubuntu1.18.04.1\n lib64ncurses5 6.1-1ubuntu1.18.04.1\n lib64tinfo5 6.1-1ubuntu1.18.04.1\n libncurses5 6.1-1ubuntu1.18.04.1\n libncursesw5 6.1-1ubuntu1.18.04.1\n libtinfo5 6.1-1ubuntu1.18.04.1\n libx32ncurses5 6.1-1ubuntu1.18.04.1\n libx32ncursesw5 6.1-1ubuntu1.18.04.1\n libx32tinfo5 6.1-1ubuntu1.18.04.1\n ncurses-bin 6.1-1ubuntu1.18.04.1\n\nUbuntu 16.04 LTS (Available with Ubuntu Pro):\n lib32ncurses5 6.0+20160213-1ubuntu1+esm3\n lib32ncursesw5 6.0+20160213-1ubuntu1+esm3\n lib32tinfo5 6.0+20160213-1ubuntu1+esm3\n lib64ncurses5 6.0+20160213-1ubuntu1+esm3\n lib64tinfo5 6.0+20160213-1ubuntu1+esm3\n libncurses5 6.0+20160213-1ubuntu1+esm3\n libncursesw5 6.0+20160213-1ubuntu1+esm3\n libtinfo5 6.0+20160213-1ubuntu1+esm3\n libx32ncurses5 6.0+20160213-1ubuntu1+esm3\n libx32ncursesw5 6.0+20160213-1ubuntu1+esm3\n libx32tinfo5 6.0+20160213-1ubuntu1+esm3\n ncurses-bin 6.0+20160213-1ubuntu1+esm3\n\nUbuntu 14.04 LTS (Available with Ubuntu Pro):\n lib32ncurses5 5.9+20140118-1ubuntu1+esm3\n lib32ncursesw5 5.9+20140118-1ubuntu1+esm3\n lib32tinfo5 5.9+20140118-1ubuntu1+esm3\n lib64ncurses5 5.9+20140118-1ubuntu1+esm3\n lib64tinfo5 5.9+20140118-1ubuntu1+esm3\n libncurses5 5.9+20140118-1ubuntu1+esm3\n libncursesw5 5.9+20140118-1ubuntu1+esm3\n libtinfo5 5.9+20140118-1ubuntu1+esm3\n libx32ncurses5 5.9+20140118-1ubuntu1+esm3\n libx32ncursesw5 5.9+20140118-1ubuntu1+esm3\n libx32tinfo5 5.9+20140118-1ubuntu1+esm3\n ncurses-bin 5.9+20140118-1ubuntu1+esm3\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6099-1\n CVE-2019-17594, CVE-2019-17595, CVE-2021-39537, CVE-2022-29458,\n CVE-2023-29491\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/ncurses/6.4-2ubuntu0.1\nhttps://launchpad.net/ubuntu/+source/ncurses/6.3+20220423-2ubuntu0.1\n https://launchpad.net/ubuntu/+source/ncurses/6.3-2ubuntu0.1\n https://launchpad.net/ubuntu/+source/ncurses/6.2-0ubuntu2.1\nhttps://launchpad.net/ubuntu/+source/ncurses/6.1-1ubuntu1.18.04.1\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-29458"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"db": "VULHUB",
"id": "VHN-420992"
},
{
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"db": "PACKETSTORM",
"id": "167488"
},
{
"db": "PACKETSTORM",
"id": "172500"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-29458",
"trust": 3.6
},
{
"db": "PACKETSTORM",
"id": "167488",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.5451",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2022.5300",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2023.3001",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3736",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-420992",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2022-29458",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "172500",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-420992"
},
{
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"db": "PACKETSTORM",
"id": "167488"
},
{
"db": "PACKETSTORM",
"id": "172500"
},
{
"db": "NVD",
"id": "CVE-2022-29458"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
]
},
"id": "VAR-202204-0632",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-420992"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T10:47:26.836000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HT213488",
"trust": 0.8,
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"title": "Debian CVElist Bug Report Logs: ncurses: CVE-2022-29458",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=45c96f9efcbf1f005965c804ad562312"
},
{
"title": "Ubuntu Security Notice: USN-5477-1: ncurses vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-5477-1"
},
{
"title": "Amazon Linux 2: ALAS2-2022-1893",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2022-1893"
},
{
"title": "Amazon Linux 2022: ALAS-2022-217",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=alas-2022-217"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/adegoodyer/ubuntu "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/adegoodyer/kubernetes-admin-toolkit "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/oshawa-connection/vulnerableapp "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.1
},
{
"problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-420992"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"db": "NVD",
"id": "CVE-2022-29458"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://support.apple.com/kb/ht213488"
},
{
"trust": 1.8,
"url": "http://seclists.org/fulldisclosure/2022/oct/41"
},
{
"trust": 1.8,
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html"
},
{
"trust": 1.8,
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"
},
{
"trust": 1.8,
"url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00037.html"
},
{
"trust": 1.1,
"url": "http://seclists.org/fulldisclosure/2022/oct/28"
},
{
"trust": 1.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-29458"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-29458/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.5451"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.5300"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/ncurses-out-of-bounds-memory-reading-via-convert-strings-38580"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/167488/ubuntu-security-notice-usn-5477-1.html"
},
{
"trust": 0.6,
"url": "https://support.apple.com/en-us/ht213488"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2023.3001"
},
{
"trust": 0.2,
"url": "https://ubuntu.com/security/notices/usn-5477-1"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17594"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17595"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-39537"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/125.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009870"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-16879"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19211"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ncurses/6.1-1ubuntu1.18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ncurses/6.4-2ubuntu0.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ncurses/6.3-2ubuntu0.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ncurses/6.3+20220423-2ubuntu0.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ncurses/6.2-0ubuntu2.1"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-29491"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-6099-1"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-420992"
},
{
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"db": "PACKETSTORM",
"id": "167488"
},
{
"db": "PACKETSTORM",
"id": "172500"
},
{
"db": "NVD",
"id": "CVE-2022-29458"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-420992"
},
{
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"db": "PACKETSTORM",
"id": "167488"
},
{
"db": "PACKETSTORM",
"id": "172500"
},
{
"db": "NVD",
"id": "CVE-2022-29458"
},
{
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-04-18T00:00:00",
"db": "VULHUB",
"id": "VHN-420992"
},
{
"date": "2022-04-18T00:00:00",
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"date": "2023-08-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"date": "2022-06-19T16:42:23",
"db": "PACKETSTORM",
"id": "167488"
},
{
"date": "2023-05-23T13:56:02",
"db": "PACKETSTORM",
"id": "172500"
},
{
"date": "2022-04-18T21:15:07.600000",
"db": "NVD",
"id": "CVE-2022-29458"
},
{
"date": "2022-04-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-08T00:00:00",
"db": "VULHUB",
"id": "VHN-420992"
},
{
"date": "2022-11-08T00:00:00",
"db": "VULMON",
"id": "CVE-2022-29458"
},
{
"date": "2023-08-08T07:21:00",
"db": "JVNDB",
"id": "JVNDB-2022-009766"
},
{
"date": "2023-11-07T03:46:02.100000",
"db": "NVD",
"id": "CVE-2022-29458"
},
{
"date": "2023-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ncurses\u00a0 Out-of-bounds read vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009766"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202204-3736"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.