Vulnerability from csaf_suse
Published
2025-03-26 11:29
Modified
2025-03-26 11:29
Summary
Security update for tomcat10

Notes

Title of the patch
Security update for tomcat10
Description of the patch
This update for tomcat10 fixes the following issues: - CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with partial PUT (bsc#1239302) Other fixes: - Update to Tomcat 10.1.39 * Fixes: + launch with java 17 (bsc#1239676) * Catalina + Fix: 69602: Fix regression in releases from 12-2024 that were too strict and rejected weak etags in the If-Range header with a 400 response. Instead will consider it as a failed match since strong etags are required for If-Range. (remm) + Fix: When looking up class loader resources by resource name, the resource name should not start with '/'. If the resource name does start with '/', Tomcat is lenient and looks it up as if the '/' was not present. When the web application class loader was configured with external repositories and names starting with '/' were used for lookups, it was possible that cached 'not found' results could effectively hide lookup results using the correct resource name. (markt) + Fix: Enable the JNDIRealm to validate credentials provided to HttpServletRequest.login(String username, String password) when the realm is configured to use GSSAPI authentication. (markt) + Fix: Fix a bug in the JRE compatibility detection that incorrectly identified Java 19 and Java 20 as supporting Java 21 features. (markt) + Fix: Improve the checks for exposure to and protection against CVE-2024-56337 so that reflection is not used unless required. The checks for whether the file system is case sensitive or not have been removed. (markt) + Add: Add support for logging the connection ID (as returned by ServletRequest.getServletConnection().getConnectionId()) with the AccessLogValve and ExtendedAccessLogValve. Based on pull request #814 by Dmole. (markt) + Fix: Avoid scenarios where temporary files used for partial PUT would not be deleted. (remm) + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught exception introduced for the check for CVE-2024-56337. (remm) * Cluster + Add: 69598: Add detection of service account token changes to the KubernetesMembershipProvider implementation and reload the token if it changes. Based on a patch by Miroslav Jezbera. (markt) * Coyote + Fix: 69575: Avoid using compression if a response is already compressed using compress, deflate or zstd. (remm) + Update: Use Transfer-Encoding for compression rather than Content-Encoding if the client submits a TE header containing gzip. (remm) + Fix: Fix a race condition in the handling of HTTP/2 stream reset that could cause unexpected 500 responses. (markt) * Other + Add: Add makensis as an option for building the Installer for Windows on non-Windows platforms. (rjung/markt) + Update: Update Byte Buddy to 1.17.1. (markt) + Update: Update Checkstyle to 10.21.3. (markt) + Update: Update SpotBugs to 4.9.1. (markt) + Update: Update JSign to 7.1. (markt) + Add: Improvements to French translations. (remm) + Add: Improvements to Japanese translations by tak7iji. (markt) + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON documents. (remm) - Update to Tomcat 10.1.35 * Catalina + Update: Add tableName configuration on the DataSourcePropertyStore that may be used by the WebDAV Servlet. (remm) + Update: Improve HTTP If headers processing according to RFC 9110. Based on pull request #796 by Chenjp. (remm/markt) + Update: Allow readOnly attribute configuration on the Resources element and allow configure the readOnly attribute value of the main resources. The attribute value will also be used by the default and WebDAV Servlets. (remm) + Fix: 69285: Optimise the creation of the parameter map for included requests. Based on sample code and test cases provided by John Engebretson. (markt) + Fix: 69527: Avoid rare cases where a cached resource could be set with 0 content length, or could be evicted immediately. (remm) + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect requests without body for WebDAV LOCK and PROPFIND. (remm) + Fix: 69528: Add multi-release JAR support for the bloom archiveIndexStrategy of the Resources. (remm) + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based on a patch submitted by Chenjp. (remm) + Fix: Remove unused session to client map from CrawlerSessionManagerValve. Submitted by Brian Matzon. (remm) + Add: Add a check to ensure that, if one or more web applications are potentially vulnerable to CVE-2024-56337, the JVM has been configured to protect against the vulnerability and to configure the JVM correctly if not. Where one or more web applications are potentially vulnerable to CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be confirmed that the JVM has been correctly configured, prevent the impacted web applications from starting. (markt) + Fix: When using the WebDAV servlet with serveSubpathOnly set to true, ensure that the destination for any requested WebDAV operation is also restricted to the sub-path. (markt) + Fix: Generate an appropriate Allow HTTP header when the Default servlet returns a 405 (method not allowed) response in response to a DELETE request because the target resource cannot be deleted. Pull request #802 provided by Chenjp. (markt) + Code: Refactor creation of RequestDispatcher instances so that the processing of the provided path is consistent with normal request processing. (markt) + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling attributes to Context to provide control over the handling of the path used to created a RequestDispatcher. (markt) + Fix: Handle a potential NullPointerException after an IOException occurs on a non-container thread during asynchronous processing. (markt) + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm) * Coyote + Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does not support. These settings are now silently ignored. (markt) + Fix: Avoid a rare NullPointerException when recycling the Http11InputBuffer. (markt) + Fix: Lower the log level to debug for logging an invalid socket channel when processing poller events for the NIO Connector as this may occur in normal usage. (markt) + Code: Clean-up references to the HTTP/2 stream once request processing has completed to aid GC and reduce the size of the HTTP/2 recycled request and response cache. (markt) + Add: Add a new Connector configuration attribute, encodedReverseSolidusHandling, to control how %5c sequences in URLs are handled. The default behaviour is unchanged (decode) keeping in mind that the allowBackslash attribute determines how the decoded URI is processed. (markt) + Fix: 69545: Improve CRLF skipping for the available method of the ChunkedInputFilter. (remm) + Fix: Improve the performance of repeated calls to getHeader(). Pull request #813 provided by Adwait Kumar Singh. (markt) + Fix: 69559: Ensure that the Java 24 warning regarding the use of sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code will be used. (markt) * Jasper + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP include actions if both the page attribute and the body contained parameters. Pull request #803 provided by Chenjp. (markt) + Fix: Update the identifier validation in the Expression Language parser to reflect that, as of Java 9, _ is also a Java keyword and may not be used as an identifier. (markt) + Fix: 69521: Update the EL Parser to allow the full range of valid characters in an EL identifier as defined by the Java Language Specification. (markt) + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch provided by John Engebretson. (markt) * Web applications + Add: Documentation. Expand the description of the security implications of setting mapperContextRootRedirectEnabled and/or mapperDirectoryRedirectEnabled to true. (markt) + Fix: Documentation. Better document the default for the truststoreProvider attribute of a SSLHostConfig element. (markt) * Other + Update: Update to Commons Daemon 1.4.1. (markt) + Update: Update the packaged version of the Tomcat Migration Tool for Jakarta EE to 1.0.9. (markt) + Update: Update the internal fork of Commons Pool to 2.12.1. (markt) + Update: Update Byte Buddy to 1.16.1. (markt) + Update: Update UnboundID to 7.0.2. (markt) + Update: Update Checkstyle to 10.21.2. (markt) + Update: Update SpotBugs to 4.9.0. (markt) + Add: Improvements to French translations. (remm) + Add: Improvements to Chinese translations by leeyazhou. (markt) + Add: Improvements to Japanese translations by tak7iji. (markt) + Add: Improvements to Japanese translations by tak7iji. (markt)
Patchnames
SUSE-2025-1024,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1024,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1024,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1024,openSUSE-SLE-15.6-2025-1024
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for tomcat10",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "This update for tomcat10 fixes the following issues:\n\n- CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with\n      partial PUT (bsc#1239302)\n\nOther fixes:\n\n- Update to Tomcat 10.1.39\n  * Fixes:\n    + launch with java 17 (bsc#1239676)\n  * Catalina\n    + Fix: 69602: Fix regression in releases from 12-2024 that were too strict\n      and rejected weak etags in the If-Range header with a 400 response.\n      Instead will consider it as a failed match since strong etags are required\n      for If-Range. (remm)\n    + Fix: When looking up class loader resources by resource name, the resource\n      name should not start with '/'. If the resource name does start with '/',\n      Tomcat is lenient and looks it up as if the '/' was not present. When the\n      web application class loader was configured with external repositories and\n      names starting with '/' were used for lookups, it was possible that cached\n      'not found' results could effectively hide lookup results using the\n      correct resource name. (markt)\n    + Fix: Enable the JNDIRealm to validate credentials provided to\n      HttpServletRequest.login(String username, String password) when the realm\n      is configured to use GSSAPI authentication. (markt)\n    + Fix: Fix a bug in the JRE compatibility detection that incorrectly\n      identified Java 19 and Java 20 as supporting Java 21 features. (markt)\n    + Fix: Improve the checks for exposure to and protection against\n      CVE-2024-56337 so that reflection is not used unless required. The checks\n      for whether the file system is case sensitive or not have been removed.\n      (markt)\n    + Add: Add support for logging the connection ID (as returned by\n      ServletRequest.getServletConnection().getConnectionId()) with the\n      AccessLogValve and ExtendedAccessLogValve. Based on pull request #814 by\n      Dmole. (markt)\n    + Fix: Avoid scenarios where temporary files used for partial PUT would not\n      be deleted. (remm)\n    + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught\n      exception introduced for the check for CVE-2024-56337. (remm)\n  * Cluster\n    + Add: 69598: Add detection of service account token changes to the\n      KubernetesMembershipProvider implementation and reload the token if it\n      changes. Based on a patch by Miroslav Jezbera. (markt)\n  * Coyote\n    + Fix: 69575: Avoid using compression if a response is already compressed\n      using compress, deflate or zstd. (remm)\n    + Update: Use Transfer-Encoding for compression rather than Content-Encoding\n      if the client submits a TE header containing gzip. (remm)\n    + Fix: Fix a race condition in the handling of HTTP/2 stream reset that\n      could cause unexpected 500 responses. (markt)\n  * Other\n    + Add: Add makensis as an option for building the Installer for Windows on\n      non-Windows platforms. (rjung/markt)\n    + Update: Update Byte Buddy to 1.17.1. (markt)\n    + Update: Update Checkstyle to 10.21.3. (markt)\n    + Update: Update SpotBugs to 4.9.1. (markt)\n    + Update: Update JSign to 7.1. (markt)\n    + Add: Improvements to French translations. (remm)\n    + Add: Improvements to Japanese translations by tak7iji. (markt)\n    + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON\n      documents. (remm) \n\n- Update to Tomcat 10.1.35\n  * Catalina\n    + Update: Add tableName configuration on the DataSourcePropertyStore that\n      may be used by the WebDAV Servlet. (remm)\n    + Update: Improve HTTP If headers processing according to RFC 9110. Based on\n      pull request #796 by Chenjp. (remm/markt)\n    + Update: Allow readOnly attribute configuration on the Resources element\n      and allow configure the readOnly attribute value of the main resources.\n      The attribute value will also be used by the default and WebDAV Servlets.\n      (remm)\n    + Fix: 69285: Optimise the creation of the parameter map for included\n      requests. Based on sample code and test cases provided by John\n      Engebretson. (markt)\n    + Fix: 69527: Avoid rare cases where a cached resource could be set with 0\n      content length, or could be evicted immediately. (remm)\n    + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect\n      requests without body for WebDAV LOCK and PROPFIND. (remm)\n    + Fix: 69528: Add multi-release JAR support for the bloom\n      archiveIndexStrategy of the Resources. (remm)\n    + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based\n      on a patch submitted by Chenjp. (remm)\n    + Fix: Remove unused session to client map from CrawlerSessionManagerValve.\n      Submitted by Brian Matzon. (remm)\n    + Add: Add a check to ensure that, if one or more web applications are\n      potentially vulnerable to CVE-2024-56337, the JVM has been configured to\n      protect against the vulnerability and to configure the JVM correctly if\n      not. Where one or more web applications are potentially vulnerable to\n      CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be\n      confirmed that the JVM has been correctly configured, prevent the impacted\n      web applications from starting. (markt)\n    + Fix: When using the WebDAV servlet with serveSubpathOnly set to true,\n      ensure that the destination for any requested WebDAV operation is also\n      restricted to the sub-path. (markt)\n    + Fix: Generate an appropriate Allow HTTP header when the Default servlet\n      returns a 405 (method not allowed) response in response to a DELETE\n      request because the target resource cannot be deleted. Pull request #802\n      provided by Chenjp. (markt)\n    + Code: Refactor creation of RequestDispatcher instances so that the\n      processing of the provided path is consistent with normal request\n      processing. (markt)\n    + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling\n      attributes to Context to provide control over the handling of the path\n      used to created a RequestDispatcher. (markt)\n    + Fix: Handle a potential NullPointerException after an IOException occurs\n      on a non-container thread during asynchronous processing. (markt)\n    + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)\n  * Coyote\n    + Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does\n      not support. These settings are now silently ignored. (markt)\n    + Fix: Avoid a rare NullPointerException when recycling the\n      Http11InputBuffer. (markt)\n    + Fix: Lower the log level to debug for logging an invalid socket channel\n      when processing poller events for the NIO Connector as this may occur in\n      normal usage. (markt)\n    + Code: Clean-up references to the HTTP/2 stream once request processing has\n      completed to aid GC and reduce the size of the HTTP/2 recycled request and\n      response cache. (markt)\n    + Add: Add a new Connector configuration attribute,\n      encodedReverseSolidusHandling, to control how %5c sequences in URLs are\n      handled. The default behaviour is unchanged (decode) keeping in mind that\n      the allowBackslash attribute determines how the decoded URI is processed.\n      (markt)\n    + Fix: 69545: Improve CRLF skipping for the available method of the\n      ChunkedInputFilter. (remm)\n    + Fix: Improve the performance of repeated calls to getHeader(). Pull\n      request #813 provided by Adwait Kumar Singh. (markt)\n    + Fix: 69559: Ensure that the Java 24 warning regarding the use of\n      sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code\n      will be used. (markt)\n  * Jasper\n    + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP\n      include actions if both the page attribute and the body contained\n      parameters. Pull request #803 provided by Chenjp. (markt)\n    + Fix: Update the identifier validation in the Expression Language parser to\n      reflect that, as of Java 9, _ is also a Java keyword and may not be used\n      as an identifier. (markt)\n    + Fix: 69521: Update the EL Parser to allow the full range of valid\n      characters in an EL identifier as defined by the Java Language\n      Specification. (markt)\n    + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch\n      provided by John Engebretson. (markt)\n  * Web applications\n    + Add: Documentation. Expand the description of the security implications of\n      setting mapperContextRootRedirectEnabled and/or\n      mapperDirectoryRedirectEnabled to true. (markt)\n    + Fix: Documentation. Better document the default for the truststoreProvider\n      attribute of a SSLHostConfig element. (markt)\n  * Other\n    + Update: Update to Commons Daemon 1.4.1. (markt)\n    + Update: Update the packaged version of the Tomcat Migration Tool for\n      Jakarta EE to 1.0.9. (markt)\n    + Update: Update the internal fork of Commons Pool to 2.12.1. (markt)\n    + Update: Update Byte Buddy to 1.16.1. (markt)\n    + Update: Update UnboundID to 7.0.2. (markt)\n    + Update: Update Checkstyle to 10.21.2. (markt)\n    + Update: Update SpotBugs to 4.9.0. (markt)\n    + Add: Improvements to French translations. (remm)\n    + Add: Improvements to Chinese translations by leeyazhou. (markt)\n    + Add: Improvements to Japanese translations by tak7iji. (markt) \n    + Add: Improvements to Japanese translations by tak7iji. (markt)",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "SUSE-2025-1024,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1024,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1024,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1024,openSUSE-SLE-15.6-2025-1024",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1024-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2025:1024-1",
            url: "https://www.suse.com/support/update/announcement/2025/suse-su-20251024-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2025:1024-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020602.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1239302",
            url: "https://bugzilla.suse.com/1239302",
         },
         {
            category: "self",
            summary: "SUSE Bug 1239676",
            url: "https://bugzilla.suse.com/1239676",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2024-56337 page",
            url: "https://www.suse.com/security/cve/CVE-2024-56337/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2025-24813 page",
            url: "https://www.suse.com/security/cve/CVE-2025-24813/",
         },
      ],
      title: "Security update for tomcat10",
      tracking: {
         current_release_date: "2025-03-26T11:29:12Z",
         generator: {
            date: "2025-03-26T11:29:12Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2025:1024-1",
         initial_release_date: "2025-03-26T11:29:12Z",
         revision_history: [
            {
               date: "2025-03-26T11:29:12Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "tomcat10-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-doc-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-embed-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                        product: {
                           name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                           product_id: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "noarch",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
                        product: {
                           name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
                           product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
                        product: {
                           name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
                           product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
                        product: {
                           name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
                           product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server 15 SP5-LTSS",
                        product: {
                           name: "SUSE Linux Enterprise Server 15 SP5-LTSS",
                           product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sles-ltss:15:sp5",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
                        product: {
                           name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
                           product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sles_sap:15:sp5",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "openSUSE Leap 15.6",
                        product: {
                           name: "openSUSE Leap 15.6",
                           product_id: "openSUSE Leap 15.6",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:leap:15.6",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
               product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
               product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
               product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
               product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
               product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
               product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
               product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
               product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-doc-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-embed-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6",
               product_id: "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            },
            product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.6",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2024-56337",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2024-56337",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property  sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the  system property sun.io.useCanonCaches, if set, must be set to false  (it defaults to false)\n- running on Java 21 onwards: no further configuration is required  (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that  sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set  sun.io.useCanonCaches to false by default where it can.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2024-56337",
               url: "https://www.suse.com/security/cve/CVE-2024-56337",
            },
            {
               category: "external",
               summary: "SUSE Bug 1234663 for CVE-2024-56337",
               url: "https://bugzilla.suse.com/1234663",
            },
            {
               category: "external",
               summary: "SUSE Bug 1236809 for CVE-2024-56337",
               url: "https://bugzilla.suse.com/1236809",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2025-03-26T11:29:12Z",
               details: "important",
            },
         ],
         title: "CVE-2024-56337",
      },
      {
         cve: "CVE-2025-24813",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2025-24813",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Path Equivalence: 'file.Name' (Internal Dot) leading to  Remote Code Execution and/or Information disclosure  and/or malicious content added to uploaded files via write enabled  Default Servlet  in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:\n-  writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of  a target URL for public uploads\n-  attacker knowledge of the names of security sensitive files being  uploaded\n-  the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to       perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n-  support for partial PUT (enabled by default)\n-  application was using Tomcat's file based session persistence with the  default storage location\n-  application included a library that may be leveraged in a  deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
               "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2025-24813",
               url: "https://www.suse.com/security/cve/CVE-2025-24813",
            },
            {
               category: "external",
               summary: "SUSE Bug 1239302 for CVE-2025-24813",
               url: "https://bugzilla.suse.com/1239302",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch",
                  "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2025-03-26T11:29:12Z",
               details: "important",
            },
         ],
         title: "CVE-2025-24813",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.