Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-56337
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 11.0.0-M1 ≤ 11.0.1 Version: 10.1.0-M1 ≤ 10.1.33 Version: 9.0.0.M1 ≤ 9.0.97 |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-56337", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-31T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-01T04:56:29.394Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2025-01-03T12:04:31.817Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "https://security.netapp.com/advisory/ntap-20250103-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Apache Tomcat", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "11.0.1", status: "affected", version: "11.0.0-M1", versionType: "semver", }, { lessThanOrEqual: "10.1.33", status: "affected", version: "10.1.0-M1", versionType: "semver", }, { lessThanOrEqual: "9.0.97", status: "affected", version: "9.0.0.M1", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "This vulnerability was first reported by Nacl, WHOAMI, Yemoli and Ruozhi.", }, { lang: "en", type: "finder", value: "This vulnerability was independently reported with a very helpful PoC by dawu@knownsec 404 team and Sunflower@knownsec 404 team", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.</p><p>This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.</p><p>The mitigation for CVE-2024-50379 was incomplete.</p><p>Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:<br>- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)<br>- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)<br>- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)</p><p><span style=\"background-color: var(--wht);\">Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.</span></p>", }, ], value: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", }, ], metrics: [ { other: { content: { text: "important", }, type: "Textual description of severity", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-367", description: "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-20T15:28:54.738Z", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "vdb-entry", ], url: "https://www.cve.org/CVERecord?id=CVE-2024-50379", }, { tags: [ "vendor-advisory", ], url: "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", }, ], source: { discovery: "UNKNOWN", }, title: "Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2024-56337", datePublished: "2024-12-20T15:28:54.738Z", dateReserved: "2024-12-20T11:16:29.949Z", dateUpdated: "2025-01-03T12:04:31.817Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-56337\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-12-20T16:15:24.260\",\"lastModified\":\"2025-01-03T12:15:26.787\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\\n\\nThe mitigation for CVE-2024-50379 was incomplete.\\n\\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\\n\\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de condición de ejecución de tiempo de uso y tiempo de verificación (TOCTOU) en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.1, desde 10.1.0-M1 hasta 10.1.33, desde 9.0.0.M1 hasta 9.0.97. La mitigación de CVE-2024-50379 fue incompleta. Los usuarios que ejecuten Tomcat en un sistema de archivos que no distinga entre mayúsculas y minúsculas con la escritura del servlet predeterminada habilitada (el parámetro de inicialización de solo lectura establecido en el valor no predeterminado de falso) pueden necesitar una configuración adicional para mitigar por completo CVE-2024-50379 según la versión de Java que estén usando con Tomcat: - ejecutándose en Java 8 o Java 11: la propiedad del sistema sun.io.useCanonCaches debe establecerse explícitamente en falso (el valor predeterminado es verdadero) - ejecutándose en Java 17: la propiedad del sistema sun.io.useCanonCaches, si está establecida, debe establecerse en falso (el valor predeterminado es falso) - ejecutándose en Java 21 en adelante: no se requiere ninguna configuración adicional (la propiedad del sistema y el caché problemático se han eliminado) Tomcat 11.0.3, 10.1.35 y 9.0.99 en adelante incluirán comprobaciones de que sun.io.useCanonCaches esté configurado correctamente antes de permitir que el servlet predeterminado esté habilitado para escritura en un sistema de archivos que no distinga entre mayúsculas y minúsculas. Tomcat también establecerá sun.io.useCanonCaches como falso de forma predeterminada cuando sea posible.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.cve.org/CVERecord?id=CVE-2024-50379\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250103-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250103-0002/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-03T12:04:31.817Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56337\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-31T18:50:00.601639Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-31T18:50:23.435Z\"}}], \"cna\": {\"title\": \"Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This vulnerability was first reported by Nacl, WHOAMI, Yemoli and Ruozhi.\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This vulnerability was independently reported with a very helpful PoC by dawu@knownsec 404 team and Sunflower@knownsec 404 team\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.0.1\"}, {\"status\": \"affected\", \"version\": \"10.1.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.1.33\"}, {\"status\": \"affected\", \"version\": \"9.0.0.M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.0.97\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.cve.org/CVERecord?id=CVE-2024-50379\", \"tags\": [\"vdb-entry\"]}, {\"url\": \"https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\\n\\nThe mitigation for CVE-2024-50379 was incomplete.\\n\\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\\n- running on Java 8 or Java 11: the system property\\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\\n- running on Java 17: the\\u00a0system property sun.io.useCanonCaches, if set, must be set to false\\u00a0(it defaults to false)\\n- running on Java 21 onwards: no further configuration is required\\u00a0(the system property and the problematic cache have been removed)\\n\\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\\u00a0sun.io.useCanonCaches to false by default where it can.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<p>Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.</p><p>This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.</p><p>The mitigation for CVE-2024-50379 was incomplete.</p><p>Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:<br>- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)<br>- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)<br>- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)</p><p><span style=\\\"background-color: var(--wht);\\\">Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.</span></p>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2024-12-20T15:28:54.738Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-56337\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-03T12:04:31.817Z\", \"dateReserved\": \"2024-12-20T11:16:29.949Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-12-20T15:28:54.738Z\", \"assignerShortName\": \"apache\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
ncsc-2025-0020
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft kwetsbaarheden verholpen in diverse database producten en subsystemen, zoals de Core Database, Graal, Application Express, GoldenGate en REST data.", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden bevinden zich in verschillende componenten van de Oracle Database, waaronder de Data Mining component en de Java VM. Deze kwetsbaarheden stellen laaggeprivilegieerde geauthenticeerde gebruikers in staat om het systeem te compromitteren, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie. De Java VM-kwetsbaarheid kan ook leiden tot ongeautoriseerde wijzigingen van gegevens.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Unchecked Error Condition", title: "CWE-391", }, { category: "general", text: "Misinterpretation of Input", title: "CWE-115", }, { category: "general", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "general", text: "Truncation of Security-relevant Information", title: "CWE-222", }, { category: "general", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "general", text: "Improper Validation of Specified Type of Input", title: "CWE-1287", }, { category: "general", text: "Insecure Storage of Sensitive Information", title: "CWE-922", }, { category: "general", text: "Integer Underflow (Wrap or Wraparound)", title: "CWE-191", }, { category: "general", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, { category: "general", text: "Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')", title: "CWE-776", }, { category: "general", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Expected Behavior Violation", title: "CWE-440", }, { category: "general", text: "Improper Validation of Syntactic Correctness of Input", title: "CWE-1286", }, { category: "general", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "general", text: "Reachable Assertion", title: "CWE-617", }, { category: "general", text: "Uncontrolled Search Path Element", title: "CWE-427", }, { category: "general", text: "URL Redirection to Untrusted Site ('Open Redirect')", title: "CWE-601", }, { category: "general", text: "Authentication Bypass Using an Alternate Path or Channel", title: "CWE-288", }, { category: "general", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Improper Access Control", title: "CWE-284", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "general", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, { category: "general", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')", title: "CWE-757", }, { category: "general", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "general", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "general", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "Incorrect Default Permissions", title: "CWE-276", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd; oracle", url: "https://www.oracle.com/security-alerts/cpujan2025.html", }, ], title: "Kwetsbaarheden verholpen in Oracle Database producten", tracking: { current_release_date: "2025-01-22T13:30:16.354373Z", id: "NCSC-2025-0020", initial_release_date: "2025-01-22T13:30:16.354373Z", revision_history: [ { date: "2025-01-22T13:30:16.354373Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "graal_development_kit_for_micronaut", product: { name: "graal_development_kit_for_micronaut", product_id: "CSAFPID-1751216", product_identification_helper: { cpe: "cpe:2.3:a:oracle:graal_development_kit_for_micronaut:23.5-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_data_mining", product: { name: "database_-_data_mining", product_id: "CSAFPID-1751200", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_data_mining:19.3-19.25:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_data_mining", product: { name: "database_-_data_mining", product_id: "CSAFPID-1751199", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_data_mining:21.3-21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_migration_assistant_for_unicode", product: { name: "database_migration_assistant_for_unicode", product_id: "CSAFPID-1751212", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_migration_assistant_for_unicode:19.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_server", product: { name: "database_server", product_id: "CSAFPID-1503604", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_server:_java_vm___23.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_graalvm_multilingual_engine", product: { name: "database_-_graalvm_multilingual_engine", product_id: "CSAFPID-1751223", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:21.4-21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_graalvm_multilingual_engine", product: { name: "database_-_graalvm_multilingual_engine", product_id: "CSAFPID-1751224", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:23.5-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "application_express", product: { name: "application_express", product_id: "CSAFPID-1503575", product_identification_helper: { cpe: "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "application_express", product: { name: "application_express", product_id: "CSAFPID-1673188", product_identification_helper: { cpe: "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-342816", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-816845", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-1650825", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-1751298", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-1751299", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1650767", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-485902", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1503736", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1503739", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751093", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751094", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:23.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751095", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751204", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:23.4-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1503738", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751203", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.3-21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1650765", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "rest_data_services", product: { name: "rest_data_services", product_id: "CSAFPID-711746", product_identification_helper: { cpe: "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "rest_data_services", product: { name: "rest_data_services", product_id: "CSAFPID-1751305", product_identification_helper: { cpe: "cpe:2.3:a:oracle:rest_data_services:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "rest_data_services", product: { name: "rest_data_services", product_id: "CSAFPID-1751304", product_identification_helper: { cpe: "cpe:2.3:a:oracle:rest_data_services:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-667692", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-345049", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-611417", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-1673422", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "oracle", }, ], }, vulnerabilities: [ { cve: "CVE-2024-38998", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, references: [ { category: "self", summary: "CVE-2024-38998", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, ], title: "CVE-2024-38998", }, { cve: "CVE-2024-38999", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, references: [ { category: "self", summary: "CVE-2024-38999", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, ], title: "CVE-2024-38999", }, { cve: "CVE-2024-45490", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "other", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, ], references: [ { category: "self", summary: "CVE-2024-45490", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json", }, ], title: "CVE-2024-45490", }, { cve: "CVE-2024-45491", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], references: [ { category: "self", summary: "CVE-2024-45491", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json", }, ], title: "CVE-2024-45491", }, { cve: "CVE-2024-45492", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], references: [ { category: "self", summary: "CVE-2024-45492", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json", }, ], title: "CVE-2024-45492", }, { cve: "CVE-2024-45772", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], references: [ { category: "self", summary: "CVE-2024-45772", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45772.json", }, ], title: "CVE-2024-45772", }, { cve: "CVE-2024-47554", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2024-47554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json", }, ], title: "CVE-2024-47554", }, { cve: "CVE-2024-47561", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], product_status: { known_affected: [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299", ], }, references: [ { category: "self", summary: "CVE-2024-47561", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299", ], }, ], title: "CVE-2024-47561", }, { cve: "CVE-2024-50379", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], references: [ { category: "self", summary: "CVE-2024-50379", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json", }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-52316", cwe: { id: "CWE-391", name: "Unchecked Error Condition", }, notes: [ { category: "other", text: "Unchecked Error Condition", title: "CWE-391", }, { category: "other", text: "Authentication Bypass Using an Alternate Path or Channel", title: "CWE-288", }, ], references: [ { category: "self", summary: "CVE-2024-52316", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52316.json", }, ], title: "CVE-2024-52316", }, { cve: "CVE-2024-54677", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2024-54677", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json", }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-21553", references: [ { category: "self", summary: "CVE-2025-21553", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21553.json", }, ], title: "CVE-2025-21553", }, { cve: "CVE-2025-21557", product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1673188", ], }, references: [ { category: "self", summary: "CVE-2025-21557", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21557.json", }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1673188", ], }, ], title: "CVE-2025-21557", }, { cve: "CVE-2022-26345", cwe: { id: "CWE-427", name: "Uncontrolled Search Path Element", }, notes: [ { category: "other", text: "Uncontrolled Search Path Element", title: "CWE-427", }, ], product_status: { known_affected: [ "CSAFPID-1751199", "CSAFPID-1751200", ], }, references: [ { category: "self", summary: "CVE-2022-26345", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26345.json", }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751199", "CSAFPID-1751200", ], }, ], title: "CVE-2022-26345", }, { cve: "CVE-2023-27043", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], references: [ { category: "self", summary: "CVE-2023-27043", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json", }, ], title: "CVE-2023-27043", }, { cve: "CVE-2023-36730", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Heap-based Buffer Overflow", title: "CWE-122", }, ], product_status: { known_affected: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, references: [ { category: "self", summary: "CVE-2023-36730", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36730.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, ], title: "CVE-2023-36730", }, { cve: "CVE-2023-36785", cwe: { id: "CWE-191", name: "Integer Underflow (Wrap or Wraparound)", }, notes: [ { category: "other", text: "Integer Underflow (Wrap or Wraparound)", title: "CWE-191", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, references: [ { category: "self", summary: "CVE-2023-36785", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36785.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, ], title: "CVE-2023-36785", }, { cve: "CVE-2023-48795", cwe: { id: "CWE-222", name: "Truncation of Security-relevant Information", }, notes: [ { category: "other", text: "Truncation of Security-relevant Information", title: "CWE-222", }, { category: "other", text: "Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')", title: "CWE-757", }, { category: "other", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, ], product_status: { known_affected: [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212", ], }, references: [ { category: "self", summary: "CVE-2023-48795", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212", ], }, ], title: "CVE-2023-48795", }, { cve: "CVE-2023-52428", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216", ], }, references: [ { category: "self", summary: "CVE-2023-52428", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216", ], }, ], title: "CVE-2023-52428", }, { cve: "CVE-2024-2961", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, references: [ { category: "self", summary: "CVE-2024-2961", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, ], title: "CVE-2024-2961", }, { cve: "CVE-2024-4030", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "other", text: "Incorrect Default Permissions", title: "CWE-276", }, ], references: [ { category: "self", summary: "CVE-2024-4030", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json", }, ], title: "CVE-2024-4030", }, { cve: "CVE-2024-4032", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, notes: [ { category: "other", text: "Expected Behavior Violation", title: "CWE-440", }, ], references: [ { category: "self", summary: "CVE-2024-4032", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json", }, ], title: "CVE-2024-4032", }, { cve: "CVE-2024-6232", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, ], references: [ { category: "self", summary: "CVE-2024-6232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json", }, ], title: "CVE-2024-6232", }, { cve: "CVE-2024-6763", cwe: { id: "CWE-1286", name: "Improper Validation of Syntactic Correctness of Input", }, notes: [ { category: "other", text: "Improper Validation of Syntactic Correctness of Input", title: "CWE-1286", }, ], product_status: { known_affected: [ "CSAFPID-1751304", "CSAFPID-1751305", ], }, references: [ { category: "self", summary: "CVE-2024-6763", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1751304", "CSAFPID-1751305", ], }, ], title: "CVE-2024-6763", }, { cve: "CVE-2024-6923", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], references: [ { category: "self", summary: "CVE-2024-6923", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6923.json", }, ], title: "CVE-2024-6923", }, { cve: "CVE-2024-7254", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, ], references: [ { category: "self", summary: "CVE-2024-7254", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json", }, ], title: "CVE-2024-7254", }, { cve: "CVE-2024-7592", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2024-7592", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json", }, ], title: "CVE-2024-7592", }, { cve: "CVE-2024-8088", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, ], references: [ { category: "self", summary: "CVE-2024-8088", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8088.json", }, ], title: "CVE-2024-8088", }, { cve: "CVE-2024-8927", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, ], product_status: { known_affected: [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417", ], }, references: [ { category: "self", summary: "CVE-2024-8927", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8927.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417", ], }, ], title: "CVE-2024-8927", }, { cve: "CVE-2024-11053", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, ], references: [ { category: "self", summary: "CVE-2024-11053", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json", }, ], title: "CVE-2024-11053", }, { cve: "CVE-2024-21211", cwe: { id: "CWE-922", name: "Insecure Storage of Sensitive Information", }, notes: [ { category: "other", text: "Insecure Storage of Sensitive Information", title: "CWE-922", }, ], product_status: { known_affected: [ "CSAFPID-1751223", "CSAFPID-1751224", ], }, references: [ { category: "self", summary: "CVE-2024-21211", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21211.json", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1751223", "CSAFPID-1751224", ], }, ], title: "CVE-2024-21211", }, { cve: "CVE-2024-22262", cwe: { id: "CWE-601", name: "URL Redirection to Untrusted Site ('Open Redirect')", }, notes: [ { category: "other", text: "URL Redirection to Untrusted Site ('Open Redirect')", title: "CWE-601", }, ], product_status: { known_affected: [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, references: [ { category: "self", summary: "CVE-2024-22262", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, ], title: "CVE-2024-22262", }, { cve: "CVE-2024-24789", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Improper Validation of Specified Type of Input", title: "CWE-1287", }, ], references: [ { category: "self", summary: "CVE-2024-24789", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24789.json", }, ], title: "CVE-2024-24789", }, { cve: "CVE-2024-24790", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Misinterpretation of Input", title: "CWE-115", }, { category: "other", text: "Improper Validation of Specified Type of Input", title: "CWE-1287", }, ], references: [ { category: "self", summary: "CVE-2024-24790", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24790.json", }, ], title: "CVE-2024-24790", }, { cve: "CVE-2024-24791", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], references: [ { category: "self", summary: "CVE-2024-24791", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json", }, ], title: "CVE-2024-24791", }, { cve: "CVE-2024-28757", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "other", text: "Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')", title: "CWE-776", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, references: [ { category: "self", summary: "CVE-2024-28757", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28757.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, ], title: "CVE-2024-28757", }, { cve: "CVE-2024-33599", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, ], references: [ { category: "self", summary: "CVE-2024-33599", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json", }, ], title: "CVE-2024-33599", }, { cve: "CVE-2024-33600", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], references: [ { category: "self", summary: "CVE-2024-33600", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json", }, ], title: "CVE-2024-33600", }, { cve: "CVE-2024-33601", cwe: { id: "CWE-703", name: "Improper Check or Handling of Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "other", text: "Reachable Assertion", title: "CWE-617", }, ], references: [ { category: "self", summary: "CVE-2024-33601", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json", }, ], title: "CVE-2024-33601", }, { cve: "CVE-2024-33602", cwe: { id: "CWE-466", name: "Return of Pointer Value Outside of Expected Range", }, notes: [ { category: "other", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, ], references: [ { category: "self", summary: "CVE-2024-33602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json", }, ], title: "CVE-2024-33602", }, { cve: "CVE-2024-38819", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, ], product_status: { known_affected: [ "CSAFPID-1650825", ], }, references: [ { category: "self", summary: "CVE-2024-38819", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1650825", ], }, ], title: "CVE-2024-38819", }, { cve: "CVE-2024-38820", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, ], product_status: { known_affected: [ "CSAFPID-1650825", ], }, references: [ { category: "self", summary: "CVE-2024-38820", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1650825", ], }, ], title: "CVE-2024-38820", }, ], }
ncsc-2025-0127
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft kwetsbaarheden verholpen in verschillende Financial Services producten", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden stellen niet-geauthenticeerde kwaadwillenden in staat om via HTTP toegang te krijgen tot kritieke gegevens, wat kan leiden tot ongeautoriseerde gegevenstoegang en andere beveiligingsrisico's. Kwaadwillenden kunnen ook gebruik maken van misconfiguraties en kwetsbaarheden in de software om privilege-escalatie, denial-of-service en remote code execution uit te voeren.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, { category: "general", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "general", text: "Storage of Sensitive Data in a Mechanism without Access Control", title: "CWE-921", }, { category: "general", text: "Insecure Storage of Sensitive Information", title: "CWE-922", }, { category: "general", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, { category: "general", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, { category: "general", text: "Incorrect Implementation of Authentication Algorithm", title: "CWE-303", }, { category: "general", text: "Incorrect Permission Assignment for Critical Resource", title: "CWE-732", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, { category: "general", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Improper Access Control", title: "CWE-284", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "general", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd; oracle", url: "https://www.oracle.com/security-alerts/cpuapr2025.html", }, ], title: "Kwetsbaarheden verholpen in Oracle Financial Services", tracking: { current_release_date: "2025-04-16T15:00:12.952979Z", generator: { date: "2025-02-25T15:15:00Z", engine: { name: "V.A.", version: "1.0", }, }, id: "NCSC-2025-0127", initial_release_date: "2025-04-16T15:00:12.952979Z", revision_history: [ { date: "2025-04-16T15:00:12.952979Z", number: "1.0.0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/8.1.2.7.0", product: { name: "vers:unknown/8.1.2.7.0", product_id: "CSAFPID-2698335", }, }, { category: "product_version_range", name: "vers:unknown/8.1.3.0", product: { name: "vers:unknown/8.1.3.0", product_id: "CSAFPID-1838588", }, }, ], category: "product_name", name: "Financial Services Model Management and Governance", }, { branches: [ { category: "product_version_range", name: "vers:unknown/8.0.7.8", product: { name: "vers:unknown/8.0.7.8", product_id: "CSAFPID-1838570", }, }, { category: "product_version_range", name: "vers:unknown/8.0.8.6", product: { name: "vers:unknown/8.0.8.6", product_id: "CSAFPID-1838583", }, }, { category: "product_version_range", name: "vers:unknown/8.1.1.4", product: { name: "vers:unknown/8.1.1.4", product_id: "CSAFPID-2698354", }, }, { category: "product_version_range", name: "vers:unknown/8.1.2.5", product: { name: "vers:unknown/8.1.2.5", product_id: "CSAFPID-1838577", }, }, ], category: "product_name", name: "Financial Services Analytical Applications Infrastructure", }, { branches: [ { category: "product_version_range", name: "vers:unknown/8.0.8.1", product: { name: "vers:unknown/8.0.8.1", product_id: "CSAFPID-1199519", }, }, { category: "product_version_range", name: "vers:unknown/8.1.2.7", product: { name: "vers:unknown/8.1.2.7", product_id: "CSAFPID-1838573", }, }, { category: "product_version_range", name: "vers:unknown/8.1.2.8", product: { name: "vers:unknown/8.1.2.8", product_id: "CSAFPID-1838574", }, }, ], category: "product_name", name: "Financial Services Behavior Detection Platform", }, { branches: [ { category: "product_version_range", name: "vers:unknown/14.7.0.7.0", product: { name: "vers:unknown/14.7.0.7.0", product_id: "CSAFPID-2698380", }, }, ], category: "product_name", name: "Banking Liquidity Management", }, { branches: [ { category: "product_version_range", name: "vers:unknown/8.1.2.6", product: { name: "vers:unknown/8.1.2.6", product_id: "CSAFPID-1838589", }, }, ], category: "product_name", name: "Financial Services Compliance Studio", }, ], category: "product_family", name: "Oracle", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:oracle/8.1.2.6", product: { name: "vers:oracle/8.1.2.6", product_id: "CSAFPID-1839860", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.6:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.2.7", product: { name: "vers:oracle/8.1.2.7", product_id: "CSAFPID-1839857", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.7:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.2.7.0", product: { name: "vers:oracle/8.1.2.7.0", product_id: "CSAFPID-2699019", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.3.0", product: { name: "vers:oracle/8.1.3.0", product_id: "CSAFPID-1839858", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.3.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Financial Services Model Management and Governance", }, { branches: [ { category: "product_version_range", name: "vers:oracle/21.1.0.0.0", product: { name: "vers:oracle/21.1.0.0.0", product_id: "CSAFPID-2698953", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_apis:21.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/22.1.0.0.0", product: { name: "vers:oracle/22.1.0.0.0", product_id: "CSAFPID-2698951", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_apis:22.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/22.2.0.0.0", product: { name: "vers:oracle/22.2.0.0.0", product_id: "CSAFPID-2698952", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_apis:22.2.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Banking APIs", }, { branches: [ { category: "product_version_range", name: "vers:oracle/21.1.0.0.0", product: { name: "vers:oracle/21.1.0.0.0", product_id: "CSAFPID-2698992", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_digital_experience:21.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/22.1.0.0.0", product: { name: "vers:oracle/22.1.0.0.0", product_id: "CSAFPID-2698990", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_digital_experience:22.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/22.2.0.0.0", product: { name: "vers:oracle/22.2.0.0.0", product_id: "CSAFPID-2698994", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_digital_experience:22.2.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Banking Digital Experience", }, { branches: [ { category: "product_version_range", name: "vers:oracle/8.0.7.8", product: { name: "vers:oracle/8.0.7.8", product_id: "CSAFPID-1839976", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7.8:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.0.8.6", product: { name: "vers:oracle/8.0.8.6", product_id: "CSAFPID-1839966", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8.6:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.1.4", product: { name: "vers:oracle/8.1.1.4", product_id: "CSAFPID-2699017", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1.4:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.2.5", product: { name: "vers:oracle/8.1.2.5", product_id: "CSAFPID-1839974", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.5:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Financial Services Analytical Applications Infrastructure", }, { branches: [ { category: "product_version_range", name: "vers:oracle/5.1.0.0.0", product: { name: "vers:oracle/5.1.0.0.0", product_id: "CSAFPID-2699099", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:5.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/6.1.0.0.0", product: { name: "vers:oracle/6.1.0.0.0", product_id: "CSAFPID-2699100", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.0.0.0.0", product: { name: "vers:oracle/7.0.0.0.0", product_id: "CSAFPID-2699101", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:7.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=2.9.0.0.0|<=7.0.0.0.0", product: { name: "vers:oracle/>=2.9.0.0.0|<=7.0.0.0.0", product_id: "CSAFPID-1839884", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.0.0-7.0.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Financial Services Revenue Management and Billing", }, { branches: [ { category: "product_version_range", name: "vers:oracle/>=14.4.0.0.0|<=14.7.0.0.0", product: { name: "vers:oracle/>=14.4.0.0.0|<=14.7.0.0.0", product_id: "CSAFPID-1839866", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.4.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=14.5.0.0.0|<=14.7.0.0.0", product: { name: "vers:oracle/>=14.5.0.0.0|<=14.7.0.0.0", product_id: "CSAFPID-2698995", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Banking Corporate Lending Process Management", }, { branches: [ { category: "product_version_range", name: "vers:oracle/>=14.5.0.0.0|<=14.7.0.0.0", product: { name: "vers:oracle/>=14.5.0.0.0|<=14.7.0.0.0", product_id: "CSAFPID-1839867", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_origination:14.5.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Banking Origination", }, { branches: [ { category: "product_version_range", name: "vers:oracle/8.0.8.1", product: { name: "vers:oracle/8.0.8.1", product_id: "CSAFPID-1839881", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.2.7", product: { name: "vers:oracle/8.1.2.7", product_id: "CSAFPID-1839880", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.2.8", product: { name: "vers:oracle/8.1.2.8", product_id: "CSAFPID-1839882", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.2.9", product: { name: "vers:oracle/8.1.2.9", product_id: "CSAFPID-2698954", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.9:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Financial Services Behavior Detection Platform", }, { branches: [ { category: "product_version_range", name: "vers:oracle/8.0.8", product: { name: "vers:oracle/8.0.8", product_id: "CSAFPID-1839878", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:enterprise:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition", }, { branches: [ { category: "product_version_range", name: "vers:oracle/14.7.0.7.0", product: { name: "vers:oracle/14.7.0.7.0", product_id: "CSAFPID-2698938", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.7.5.0.0", product: { name: "vers:oracle/14.7.5.0.0", product_id: "CSAFPID-1839923", product_identification_helper: { cpe: "cpe:2.3:a:oracle:banking_liquidity_management:14.7.5.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Banking Liquidity Management", }, { branches: [ { category: "product_version_range", name: "vers:oracle/8.1.2.6", product: { name: "vers:oracle/8.1.2.6", product_id: "CSAFPID-1839871", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.6:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.2.9", product: { name: "vers:oracle/8.1.2.9", product_id: "CSAFPID-2699005", product_identification_helper: { cpe: "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.9:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Financial Services Compliance Studio", }, ], category: "product_family", name: "Oracle Financial Services Applications", }, ], category: "vendor", name: "Oracle", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:semver/5.1.0.0.0", product: { name: "vers:semver/5.1.0.0.0", product_id: "CSAFPID-2698450", }, }, { category: "product_version_range", name: "vers:semver/6.1.0.0.0", product: { name: "vers:semver/6.1.0.0.0", product_id: "CSAFPID-2698451", }, }, { category: "product_version_range", name: "vers:semver/7.0.0.0.0", product: { name: "vers:semver/7.0.0.0.0", product_id: "CSAFPID-2698452", }, }, ], category: "product_name", name: "Oracle Financial Services Revenue Management and Billing", }, ], category: "vendor", name: "Oracle Corporation", }, ], }, vulnerabilities: [ { cve: "CVE-2021-28170", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2021-28170", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-28170.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2021-28170", }, { cve: "CVE-2023-39410", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2023-39410", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2023-39410", }, { cve: "CVE-2023-49582", cwe: { id: "CWE-732", name: "Incorrect Permission Assignment for Critical Resource", }, notes: [ { category: "other", text: "Incorrect Permission Assignment for Critical Resource", title: "CWE-732", }, { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2023-49582", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2023-49582", }, { cve: "CVE-2024-5206", cwe: { id: "CWE-921", name: "Storage of Sensitive Data in a Mechanism without Access Control", }, notes: [ { category: "other", text: "Storage of Sensitive Data in a Mechanism without Access Control", title: "CWE-921", }, { category: "other", text: "Insecure Storage of Sensitive Information", title: "CWE-922", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-5206", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5206.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-5206", }, { cve: "CVE-2024-28168", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-28168", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-28168", }, { cve: "CVE-2024-28219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "other", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "other", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "other", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-28219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-28219", }, { cve: "CVE-2024-35195", cwe: { id: "CWE-670", name: "Always-Incorrect Control Flow Implementation", }, notes: [ { category: "other", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-35195", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json", }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-35195", }, { cve: "CVE-2024-37891", cwe: { id: "CWE-669", name: "Incorrect Resource Transfer Between Spheres", }, notes: [ { category: "other", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-37891", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-37891", }, { cve: "CVE-2024-38819", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-38819", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-38819", }, { cve: "CVE-2024-38820", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, { category: "general", text: "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-38820", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-38820", }, { cve: "CVE-2024-38827", cwe: { id: "CWE-639", name: "Authorization Bypass Through User-Controlled Key", }, notes: [ { category: "other", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-38827", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json", }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-38827", }, { cve: "CVE-2024-47072", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-47072", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-47072", }, { cve: "CVE-2024-47554", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-47554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-47554", }, { cve: "CVE-2024-56128", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, notes: [ { category: "other", text: "Incorrect Implementation of Authentication Algorithm", title: "CWE-303", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-56128", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-56128", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2024-57699", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2024-57699", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2024-57699", }, { cve: "CVE-2025-21573", product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2025-21573", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21573.json", }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2025-21573", }, { cve: "CVE-2025-23184", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2025-23184", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json", }, ], title: "CVE-2025-23184", }, { cve: "CVE-2025-24970", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, references: [ { category: "self", summary: "CVE-2025-24970", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005", ], }, ], title: "CVE-2025-24970", }, ], }
ncsc-2025-0128
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft meerdere kwetsbaarheden verholpen in verschillende producten, waaronder de Utilities Application Framework, WebLogic Server, en Fusion Middleware.", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om toegang te krijgen tot kritieke gegevens, Denial-of-Service (DoS) te veroorzaken, en in sommige gevallen zelfs volledige controle over systemen te verkrijgen. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal vervaardigde verzoeken te sturen of door gebruik te maken van onveilige configuraties in de getroffen producten.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Improper Neutralization of Special Elements Used in a Template Engine", title: "CWE-1336", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "general", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Inclusion of Functionality from Untrusted Control Sphere", title: "CWE-829", }, { category: "general", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "general", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd; oracle", url: "https://www.oracle.com/security-alerts/cpuapr2025.html", }, ], title: "Kwetsbaarheden verholpen in Oracle Fusion Middleware", tracking: { current_release_date: "2025-04-16T15:01:24.587426Z", generator: { date: "2025-02-25T15:15:00Z", engine: { name: "V.A.", version: "1.0", }, }, id: "NCSC-2025-0128", initial_release_date: "2025-04-16T15:01:24.587426Z", revision_history: [ { date: "2025-04-16T15:01:24.587426Z", number: "1.0.0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-2699078", product_identification_helper: { cpe: "cpe:2.3:a:oracle:access_manager:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Access Manager", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1839842", product_identification_helper: { cpe: "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.2.0.0", product: { name: "vers:oracle/14.1.2.0.0", product_id: "CSAFPID-2698989", product_identification_helper: { cpe: "cpe:2.3:a:oracle:business_process_management_suite:14.1.2.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Business Process Management Suite", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1839864", product_identification_helper: { cpe: "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.2.0.0", product: { name: "vers:oracle/14.1.2.0.0", product_id: "CSAFPID-2698967", product_identification_helper: { cpe: "cpe:2.3:a:oracle:http_server:14.1.2.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle HTTP Server", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1839938", product_identification_helper: { cpe: "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.2.0.0", product: { name: "vers:oracle/14.1.2.0.0", product_id: "CSAFPID-2699074", product_identification_helper: { cpe: "cpe:2.3:a:oracle:managed_file_transfer:14.1.2.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Managed File Transfer", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-2698998", product_identification_helper: { cpe: "cpe:2.3:a:oracle:soa_suite:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.2.0.0", product: { name: "vers:oracle/14.1.2.0.0", product_id: "CSAFPID-2698997", product_identification_helper: { cpe: "cpe:2.3:a:oracle:soa_suite:14.1.2.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle SOA Suite", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1839896", product_identification_helper: { cpe: "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.1.0.0", product: { name: "vers:oracle/14.1.1.0.0", product_id: "CSAFPID-1839897", product_identification_helper: { cpe: "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.2.0.0", product: { name: "vers:oracle/14.1.2.0.0", product_id: "CSAFPID-1840030", product_identification_helper: { cpe: "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle WebLogic Server", }, { branches: [ { category: "product_version_range", name: "vers:oracle/8.5.7", product: { name: "vers:oracle/8.5.7", product_id: "CSAFPID-1839872", product_identification_helper: { cpe: "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Outside In Technology", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1840014", product_identification_helper: { cpe: "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.1.0.0", product: { name: "vers:oracle/14.1.1.0.0", product_id: "CSAFPID-1839982", product_identification_helper: { cpe: "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.2.0.0", product: { name: "vers:oracle/14.1.2.0.0", product_id: "CSAFPID-2699125", product_identification_helper: { cpe: "cpe:2.3:a:oracle:coherence:14.1.2.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Coherence", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1839988", product_identification_helper: { cpe: "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Fusion Middleware MapViewer", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-2698948", product_identification_helper: { cpe: "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle JDeveloper", }, { branches: [ { category: "product_version_range", name: "vers:oracle/14.1.1.0.0", product: { name: "vers:oracle/14.1.1.0.0", product_id: "CSAFPID-2699057", product_identification_helper: { cpe: "cpe:2.3:a:oracle:webcenter_forms_recognition:14.1.1.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle WebCenter Forms Recognition", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1840006", product_identification_helper: { cpe: "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle WebCenter Portal", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-2698985", product_identification_helper: { cpe: "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Data Integrator", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1840028", product_identification_helper: { cpe: "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.2.0.0", product: { name: "vers:oracle/14.1.2.0.0", product_id: "CSAFPID-2699064", product_identification_helper: { cpe: "cpe:2.3:a:oracle:business_activity_monitoring:14.1.2.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Business Activity Monitoring", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-2699044", product_identification_helper: { cpe: "cpe:2.3:a:oracle:service_bus:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Service Bus", }, ], category: "product_family", name: "Oracle Fusion Middleware", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-1213401", }, }, ], category: "product_name", name: "Managed File Transfer", }, { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.3.0", product: { name: "vers:unknown/12.2.1.3.0", product_id: "CSAFPID-1536644", }, }, { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-1536288", }, }, { category: "product_version_range", name: "vers:unknown/14.1.1.0.0", product: { name: "vers:unknown/14.1.1.0.0", product_id: "CSAFPID-1536278", }, }, ], category: "product_name", name: "Weblogic Server", }, { branches: [ { category: "product_version_range", name: "vers:unknown/8.5.7", product: { name: "vers:unknown/8.5.7", product_id: "CSAFPID-1233360", }, }, ], category: "product_name", name: "Outside In Technology", }, { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-1210435", }, }, { category: "product_version_range", name: "vers:unknown/14.1.1.0.0", product: { name: "vers:unknown/14.1.1.0.0", product_id: "CSAFPID-1210304", }, }, ], category: "product_name", name: "Coherence", }, { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-1247956", }, }, ], category: "product_name", name: "Jdeveloper (Application)", }, { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.3.0", product: { name: "vers:unknown/12.2.1.3.0", product_id: "CSAFPID-1214253", }, }, { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-1232894", }, }, ], category: "product_name", name: "WebCenter Portal", }, { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-1201529", }, }, ], category: "product_name", name: "Data Integrator", }, ], category: "product_family", name: "Oracle", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1144680", product_identification_helper: { cpe: "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.1.1.0.0", product: { name: "vers:oracle/14.1.1.0.0", product_id: "CSAFPID-1144604", product_identification_helper: { cpe: "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle WebLogic Server", }, { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-39413", product_identification_helper: { cpe: "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:unknown/14.1.1.0.0", product: { name: "vers:unknown/14.1.1.0.0", product_id: "CSAFPID-39412", product_identification_helper: { cpe: "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Coherence", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.2.1.3.0", product: { name: "vers:oracle/12.2.1.3.0", product_id: "CSAFPID-1144910", }, }, { category: "product_version_range", name: "vers:oracle/12.2.1.4.0", product: { name: "vers:oracle/12.2.1.4.0", product_id: "CSAFPID-1144911", product_identification_helper: { cpe: "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle WebCenter Portal", }, { branches: [ { category: "product_version_range", name: "vers:unknown/12.2.1.3.0", product: { name: "vers:unknown/12.2.1.3.0", product_id: "CSAFPID-317201", product_identification_helper: { cpe: "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:unknown/12.2.1.4.0", product: { name: "vers:unknown/12.2.1.4.0", product_id: "CSAFPID-307786", product_identification_helper: { cpe: "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "WebCenter Portal", }, ], category: "vendor", name: "Oracle", }, ], }, vulnerabilities: [ { cve: "CVE-2020-13936", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "other", text: "Improper Neutralization of Special Elements Used in a Template Engine", title: "CWE-1336", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2020-13936", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13936.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2020-13936", }, { cve: "CVE-2020-25649", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2020-25649", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-25649.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2020-25649", }, { cve: "CVE-2023-26464", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2023-26464", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26464.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2023-26464", }, { cve: "CVE-2024-7254", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-7254", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json", }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-7254", }, { cve: "CVE-2024-9143", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-9143", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json", }, ], title: "CVE-2024-9143", }, { cve: "CVE-2024-11053", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-11053", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-11053", }, { cve: "CVE-2024-11612", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-11612", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11612.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-11612", }, { cve: "CVE-2024-25710", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-25710", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-25710", }, { cve: "CVE-2024-28168", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-28168", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-28168", }, { cve: "CVE-2024-29857", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Out-of-bounds Read", title: "CWE-125", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-29857", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-29857", }, { cve: "CVE-2024-38476", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Inclusion of Functionality from Untrusted Control Sphere", title: "CWE-829", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-38476", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-38476", }, { cve: "CVE-2024-40896", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-40896", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-40896", }, { cve: "CVE-2024-47072", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-47072", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-47072", }, { cve: "CVE-2024-47554", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-47554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-47554", }, { cve: "CVE-2024-47561", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-47561", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-47561", }, { cve: "CVE-2024-50602", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "general", text: "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-50602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-50602", }, { cve: "CVE-2024-52046", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-52046", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-52046", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-23184", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2025-23184", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json", }, ], title: "CVE-2025-23184", }, { cve: "CVE-2025-24970", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2025-24970", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2025-24970", }, { cve: "CVE-2025-27363", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, references: [ { category: "self", summary: "CVE-2025-27363", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27363.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H", version: "3.1", }, products: [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044", ], }, ], title: "CVE-2025-27363", }, ], }
ncsc-2025-0021
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Dependency on Vulnerable Third-Party Component", title: "CWE-1395", }, { category: "general", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, { category: "general", text: "Asymmetric Resource Consumption (Amplification)", title: "CWE-405", }, { category: "general", text: "Path Traversal: '.../...//'", title: "CWE-35", }, { category: "general", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "general", text: "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", title: "CWE-338", }, { category: "general", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "general", text: "Unchecked Input for Loop Condition", title: "CWE-606", }, { category: "general", text: "Multiple Interpretations of UI Input", title: "CWE-450", }, { category: "general", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "general", text: "Use of Weak Hash", title: "CWE-328", }, { category: "general", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, { category: "general", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, { category: "general", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, { category: "general", text: "Insertion of Sensitive Information Into Sent Data", title: "CWE-201", }, { category: "general", text: "Acceptance of Extraneous Untrusted Data With Trusted Data", title: "CWE-349", }, { category: "general", text: "Improper Handling of Exceptional Conditions", title: "CWE-755", }, { category: "general", text: "Improper Verification of Cryptographic Signature", title: "CWE-347", }, { category: "general", text: "Excessive Iteration", title: "CWE-834", }, { category: "general", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Expected Behavior Violation", title: "CWE-440", }, { category: "general", text: "Double Free", title: "CWE-415", }, { category: "general", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, { category: "general", text: "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", title: "CWE-924", }, { category: "general", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "general", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "general", text: "Reachable Assertion", title: "CWE-617", }, { category: "general", text: "Uncontrolled Search Path Element", title: "CWE-427", }, { category: "general", text: "Use of Password Hash Instead of Password for Authentication", title: "CWE-836", }, { category: "general", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, { category: "general", text: "Access of Resource Using Incompatible Type ('Type Confusion')", title: "CWE-843", }, { category: "general", text: "Relative Path Traversal", title: "CWE-23", }, { category: "general", text: "Improper Encoding or Escaping of Output", title: "CWE-116", }, { category: "general", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "Observable Discrepancy", title: "CWE-203", }, { category: "general", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, { category: "general", text: "Missing Cryptographic Step", title: "CWE-325", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "User Interface (UI) Misrepresentation of Critical Information", title: "CWE-451", }, { category: "general", text: "UNIX Symbolic Link (Symlink) Following", title: "CWE-61", }, { category: "general", text: "Files or Directories Accessible to External Parties", title: "CWE-552", }, { category: "general", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, { category: "general", text: "Use of Hard-coded Credentials", title: "CWE-798", }, { category: "general", text: "Unrestricted Upload of File with Dangerous Type", title: "CWE-434", }, { category: "general", text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", title: "CWE-362", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Improper Access Control", title: "CWE-284", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "general", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, { category: "general", text: "Use After Free", title: "CWE-416", }, { category: "general", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "Uncaught Exception", title: "CWE-248", }, { category: "general", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "Incorrect Authorization", title: "CWE-863", }, { category: "general", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "general", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "general", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, { category: "general", text: "Improper Privilege Management", title: "CWE-269", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "Generation of Error Message Containing Sensitive Information", title: "CWE-209", }, { category: "general", text: "Incorrect Default Permissions", title: "CWE-276", }, { category: "general", text: "Authentication Bypass by Capture-replay", title: "CWE-294", }, { category: "general", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd; oracle", url: "https://www.oracle.com/security-alerts/cpujan2025.html", }, ], title: "Kwetsbaarheden verholpen in Oracle Communications", tracking: { current_release_date: "2025-01-22T13:30:50.189632Z", id: "NCSC-2025-0021", initial_release_date: "2025-01-22T13:30:50.189632Z", revision_history: [ { date: "2025-01-22T13:30:50.189632Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1727475", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635313", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635305", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635311", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635312", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635323", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670430", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674632", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674630", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635320", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674633", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670439", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635322", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670429", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670435", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670431", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670436", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670432", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635321", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635310", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635318", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674640", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674642", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670434", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635316", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674639", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635314", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674638", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674637", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635306", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635307", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635317", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635319", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670438", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635324", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635315", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670433", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674641", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674635", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674636", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670437", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674631", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674634", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635308", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635309", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications__10.4.0.4", product: { name: "communications__10.4.0.4", product_id: "CSAFPID-1674629", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.2", product: { name: "communications___23.4.2", product_id: "CSAFPID-1670442", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.3", product: { name: "communications___23.4.3", product_id: "CSAFPID-1635325", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.4", product: { name: "communications___23.4.4", product_id: "CSAFPID-1635326", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.5", product: { name: "communications___23.4.5", product_id: "CSAFPID-1674645", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.6", product: { name: "communications___23.4.6", product_id: "CSAFPID-1674646", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___24.2.0", product: { name: "communications___24.2.0", product_id: "CSAFPID-1674644", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___7.2.1.0.0", product: { name: "communications___7.2.1.0.0", product_id: "CSAFPID-1670441", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___8.6.0.6", product: { name: "communications___8.6.0.6", product_id: "CSAFPID-1635327", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___8.6.0.8", product: { name: "communications___8.6.0.8", product_id: "CSAFPID-1635328", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___9.0.2", product: { name: "communications___9.0.2", product_id: "CSAFPID-1670440", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___9.0.3", product: { name: "communications___9.0.3", product_id: "CSAFPID-1635329", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___9.1.1.8.0", product: { name: "communications___9.1.1.8.0", product_id: "CSAFPID-1674643", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751386", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674621", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751381", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751383", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751378", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751377", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751385", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674618", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674619", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674622", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751384", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674617", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674623", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751382", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751380", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751379", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674620", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___12.0.6.0.0", product: { name: "communications_applications___12.0.6.0.0", product_id: "CSAFPID-1674627", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___5.5.22", product: { name: "communications_applications___5.5.22", product_id: "CSAFPID-1674626", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___6.0.3", product: { name: "communications_applications___6.0.3", product_id: "CSAFPID-1674628", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___6.0.4", product: { name: "communications_applications___6.0.4", product_id: "CSAFPID-1674624", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___6.0.5", product: { name: "communications_applications___6.0.5", product_id: "CSAFPID-1674625", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_asap", product: { name: "communications_asap", product_id: "CSAFPID-816792", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-764735", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-1751255", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-1751254", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-816793", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-912557", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-764247", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-1650820", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-912556", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-1751303", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-220055", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-816765", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-816766", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-816767", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-1503577", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-1751300", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-764237", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1650752", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1673396", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1751085", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1751079", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1673526", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1673391", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1673394", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1751253", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-816768", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-816769", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-912085", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1503578", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1673389", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1673390", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1751090", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_dbtier", product: { name: "communications_cloud_native_core_dbtier", product_id: "CSAFPID-1673421", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_dbtier", product: { name: "communications_cloud_native_core_dbtier", product_id: "CSAFPID-1673420", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_dbtier", product: { name: "communications_cloud_native_core_dbtier", product_id: "CSAFPID-1751246", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-816770", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-816771", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-912068", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-1503579", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_exposure_function", product: { name: "communications_cloud_native_core_network_exposure_function", product_id: "CSAFPID-816772", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_exposure_function", product: { name: "communications_cloud_native_core_network_exposure_function", product_id: "CSAFPID-912076", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_exposure_function", product: { name: "communications_cloud_native_core_network_exposure_function", product_id: "CSAFPID-1503580", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-219838", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-611387", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-816773", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912101", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-1503581", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-1751208", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-1751209", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912539", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912540", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912541", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912542", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912543", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-816774", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-816346", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-912077", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1503322", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1673413", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1673415", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1751231", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-816775", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-912544", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816348", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-912545", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816347", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-1673494", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816776", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816777", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-764240", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1650751", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1673517", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1673395", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-912069", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1751225", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1751088", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1751089", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-94291", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-816778", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-614517", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-912547", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1673392", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1503582", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1673393", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1751081", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1751084", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-912546", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-224795", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-912548", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-912102", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-912549", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1503583", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1503584", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1503585", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1672767", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1751241", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-764826", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-90016", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-912078", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-816349", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-912550", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1503586", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1503587", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751238", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751240", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1673399", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751239", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751080", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751082", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-816779", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_application_server", product: { name: "communications_converged_application_server", product_id: "CSAFPID-1751229", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_application_server", product: { name: "communications_converged_application_server", product_id: "CSAFPID-1751230", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_charging_system", product: { name: "communications_converged_charging_system", product_id: "CSAFPID-1503599", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_charging_system", product: { name: "communications_converged_charging_system", product_id: "CSAFPID-1503600", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-1751292", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-1751294", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-224793", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-1751295", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-816794", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-342793", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-1650777", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-1265", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-816350", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-1261", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_core_session_manager", product: { name: "communications_core_session_manager", product_id: "CSAFPID-1672764", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1503588", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751104", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-40293", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751242", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751237", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751097", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-611413", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751211", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-912551", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-912552", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_eagle_element_management_system", product: { name: "communications_eagle_element_management_system", product_id: "CSAFPID-1503316", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_eagle_element_management_system", product: { name: "communications_eagle_element_management_system", product_id: "CSAFPID-1503317", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_eagle_element_management_system", product: { name: "communications_eagle_element_management_system", product_id: "CSAFPID-1751243", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-764242", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-819413", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-819414", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-816780", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_fraud_monitor", product: { name: "communications_fraud_monitor", product_id: "CSAFPID-816781", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_fraud_monitor", product: { name: "communications_fraud_monitor", product_id: "CSAFPID-816782", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_fraud_monitor", product: { name: "communications_fraud_monitor", product_id: "CSAFPID-912553", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_instant_messaging_server", product: { name: "communications_instant_messaging_server", product_id: "CSAFPID-219803", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_ip_service_activator", product: { name: "communications_ip_service_activator", product_id: "CSAFPID-204622", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_ip_service_activator", product: { name: "communications_ip_service_activator", product_id: "CSAFPID-219909", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_messaging_server", product: { name: "communications_messaging_server", product_id: "CSAFPID-816351", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_messaging_server", product: { name: "communications_messaging_server", product_id: "CSAFPID-1751218", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_metasolv_solution", product: { name: "communications_metasolv_solution", product_id: "CSAFPID-611595", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816353", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816352", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-1503589", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-1503590", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-1673414", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816783", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816786", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816784", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816787", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816785", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816788", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-342803", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-1650778", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-1266", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-816354", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-204563", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_integrity", product: { name: "communications_network_integrity", product_id: "CSAFPID-219776", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-765242", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-916906", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-1751247", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-1751248", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_operations_monitor", product: { name: "communications_operations_monitor", product_id: "CSAFPID-93781", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_operations_monitor", product: { name: "communications_operations_monitor", product_id: "CSAFPID-220132", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_operations_monitor", product: { name: "communications_operations_monitor", product_id: "CSAFPID-912079", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_order_and_service_management", product: { name: "communications_order_and_service_management", product_id: "CSAFPID-224790", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_order_and_service_management", product: { name: "communications_order_and_service_management", product_id: "CSAFPID-221118", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_order_and_service_management", product: { name: "communications_order_and_service_management", product_id: "CSAFPID-1673496", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_performance_intelligence", product: { name: "communications_performance_intelligence", product_id: "CSAFPID-1503591", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_policy_management", product: { name: "communications_policy_management", product_id: "CSAFPID-816789", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_policy_management", product: { name: "communications_policy_management", product_id: "CSAFPID-816790", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_pricing_design_center", product: { name: "communications_pricing_design_center", product_id: "CSAFPID-764738", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_pricing_design_center", product: { name: "communications_pricing_design_center", product_id: "CSAFPID-816355", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1503601", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816359", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816358", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816357", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-912558", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1751233", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1503602", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1751234", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816795", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816796", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816797", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503592", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503593", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1672762", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503594", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503595", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-342804", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-819415", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-819416", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-816791", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-240600", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1673382", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1650731", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1673530", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1751235", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1751296", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-764739", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-8984", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-204510", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-204569", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-219826", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-912073", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1503596", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1503597", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1503598", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1751217", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-912080", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1673481", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1751258", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_webrtc_session_controller", product: { name: "communications_webrtc_session_controller", product_id: "CSAFPID-912554", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "oracle", }, ], }, vulnerabilities: [ { cve: "CVE-2022-41727", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2022-41727", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json", }, ], title: "CVE-2022-41727", }, { cve: "CVE-2023-4408", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2023-4408", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json", }, ], title: "CVE-2023-4408", }, { cve: "CVE-2023-5678", cwe: { id: "CWE-754", name: "Improper Check for Unusual or Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "other", text: "Missing Cryptographic Step", title: "CWE-325", }, { category: "other", text: "Unchecked Input for Loop Condition", title: "CWE-606", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", ], }, references: [ { category: "self", summary: "CVE-2023-5678", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json", }, ], title: "CVE-2023-5678", }, { cve: "CVE-2023-5981", cwe: { id: "CWE-203", name: "Observable Discrepancy", }, notes: [ { category: "other", text: "Observable Discrepancy", title: "CWE-203", }, ], product_status: { known_affected: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481", ], }, references: [ { category: "self", summary: "CVE-2023-5981", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481", ], }, ], title: "CVE-2023-5981", }, { cve: "CVE-2023-6597", cwe: { id: "CWE-61", name: "UNIX Symbolic Link (Symlink) Following", }, notes: [ { category: "other", text: "UNIX Symbolic Link (Symlink) Following", title: "CWE-61", }, ], product_status: { known_affected: [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097", ], }, references: [ { category: "self", summary: "CVE-2023-6597", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097", ], }, ], title: "CVE-2023-6597", }, { cve: "CVE-2023-7256", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "other", text: "Double Free", title: "CWE-415", }, ], product_status: { known_affected: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2023-7256", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, ], title: "CVE-2023-7256", }, { cve: "CVE-2023-29407", cwe: { id: "CWE-834", name: "Excessive Iteration", }, notes: [ { category: "other", text: "Excessive Iteration", title: "CWE-834", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2023-29407", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2023-29407", }, { cve: "CVE-2023-29408", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2023-29408", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2023-29408", }, { cve: "CVE-2023-40577", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2023-40577", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, ], title: "CVE-2023-40577", }, { cve: "CVE-2023-46218", cwe: { id: "CWE-201", name: "Insertion of Sensitive Information Into Sent Data", }, notes: [ { category: "other", text: "Insertion of Sensitive Information Into Sent Data", title: "CWE-201", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, references: [ { category: "self", summary: "CVE-2023-46218", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, ], title: "CVE-2023-46218", }, { cve: "CVE-2023-46219", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "other", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, ], product_status: { known_affected: [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, references: [ { category: "self", summary: "CVE-2023-46219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, ], title: "CVE-2023-46219", }, { cve: "CVE-2023-46604", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], product_status: { known_affected: [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104", ], }, references: [ { category: "self", summary: "CVE-2023-46604", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104", ], }, ], title: "CVE-2023-46604", }, { cve: "CVE-2023-50868", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2023-50868", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json", }, ], title: "CVE-2023-50868", }, { cve: "CVE-2024-0232", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "other", text: "Use After Free", title: "CWE-416", }, ], product_status: { known_affected: [ "CSAFPID-1650777", "CSAFPID-1650778", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-0232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json", }, ], title: "CVE-2024-0232", }, { cve: "CVE-2024-0397", product_status: { known_affected: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-0397", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, ], title: "CVE-2024-0397", }, { cve: "CVE-2024-0450", cwe: { id: "CWE-450", name: "Multiple Interpretations of UI Input", }, notes: [ { category: "other", text: "Multiple Interpretations of UI Input", title: "CWE-450", }, { category: "other", text: "Asymmetric Resource Consumption (Amplification)", title: "CWE-405", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", ], }, references: [ { category: "self", summary: "CVE-2024-0450", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json", }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", ], }, ], title: "CVE-2024-0450", }, { cve: "CVE-2024-1442", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, notes: [ { category: "other", text: "Improper Privilege Management", title: "CWE-269", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-1442", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json", }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-1442", }, { cve: "CVE-2024-2961", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-2961", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237", ], }, ], title: "CVE-2024-2961", }, { cve: "CVE-2024-3596", cwe: { id: "CWE-924", name: "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", }, notes: [ { category: "other", text: "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", title: "CWE-924", }, { category: "other", text: "Use of Weak Hash", title: "CWE-328", }, { category: "other", text: "Authentication Bypass by Capture-replay", title: "CWE-294", }, { category: "other", text: "Use of Password Hash Instead of Password for Authentication", title: "CWE-836", }, { category: "other", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, { category: "other", text: "User Interface (UI) Misrepresentation of Critical Information", title: "CWE-451", }, { category: "other", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, ], product_status: { known_affected: [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253", ], }, references: [ { category: "self", summary: "CVE-2024-3596", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json", }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253", ], }, ], title: "CVE-2024-3596", }, { cve: "CVE-2024-4030", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "other", text: "Incorrect Default Permissions", title: "CWE-276", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-4030", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2024-4030", }, { cve: "CVE-2024-4032", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, notes: [ { category: "other", text: "Expected Behavior Violation", title: "CWE-440", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-4032", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2024-4032", }, { cve: "CVE-2024-5535", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "other", text: "Dependency on Vulnerable Third-Party Component", title: "CWE-1395", }, ], product_status: { known_affected: [ "CSAFPID-1751090", "CSAFPID-1751253", ], }, references: [ { category: "self", summary: "CVE-2024-5535", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751090", "CSAFPID-1751253", ], }, ], title: "CVE-2024-5535", }, { cve: "CVE-2024-6119", cwe: { id: "CWE-843", name: "Access of Resource Using Incompatible Type ('Type Confusion')", }, notes: [ { category: "other", text: "Access of Resource Using Incompatible Type ('Type Confusion')", title: "CWE-843", }, ], product_status: { known_affected: [ "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2024-6119", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751209", ], }, ], title: "CVE-2024-6119", }, { cve: "CVE-2024-6162", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-6162", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-6162", }, { cve: "CVE-2024-6232", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-6232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2024-6232", }, { cve: "CVE-2024-7254", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-7254", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json", }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-7254", }, { cve: "CVE-2024-7592", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-7592", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-7592", }, { cve: "CVE-2024-7885", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", title: "CWE-362", }, ], product_status: { known_affected: [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, references: [ { category: "self", summary: "CVE-2024-7885", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, ], title: "CVE-2024-7885", }, { cve: "CVE-2024-8006", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-8006", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, ], title: "CVE-2024-8006", }, { cve: "CVE-2024-9143", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1751253", ], }, references: [ { category: "self", summary: "CVE-2024-9143", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json", }, ], title: "CVE-2024-9143", }, { cve: "CVE-2024-22195", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], product_status: { known_affected: [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-22195", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json", }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085", ], }, ], title: "CVE-2024-22195", }, { cve: "CVE-2024-24786", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-24786", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-24786", }, { cve: "CVE-2024-24791", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2024-24791", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, ], title: "CVE-2024-24791", }, { cve: "CVE-2024-25638", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "other", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "other", text: "Acceptance of Extraneous Untrusted Data With Trusted Data", title: "CWE-349", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, references: [ { category: "self", summary: "CVE-2024-25638", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json", }, ], scores: [ { cvss_v3: { baseScore: 8.9, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, ], title: "CVE-2024-25638", }, { cve: "CVE-2024-25710", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", ], }, references: [ { category: "self", summary: "CVE-2024-25710", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", ], }, ], title: "CVE-2024-25710", }, { cve: "CVE-2024-26308", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-26308", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-26308", }, { cve: "CVE-2024-27309", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Incorrect Authorization", title: "CWE-863", }, ], product_status: { known_affected: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-27309", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-27309", }, { cve: "CVE-2024-28219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "other", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "other", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "other", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, ], product_status: { known_affected: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547", ], }, references: [ { category: "self", summary: "CVE-2024-28219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547", ], }, ], title: "CVE-2024-28219", }, { cve: "CVE-2024-28834", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, ], product_status: { known_affected: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-28834", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, ], title: "CVE-2024-28834", }, { cve: "CVE-2024-28835", cwe: { id: "CWE-248", name: "Uncaught Exception", }, notes: [ { category: "other", text: "Uncaught Exception", title: "CWE-248", }, ], product_status: { known_affected: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-28835", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, ], title: "CVE-2024-28835", }, { cve: "CVE-2024-28849", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-28849", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-28849", }, { cve: "CVE-2024-29025", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-29025", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-29025", }, { cve: "CVE-2024-29131", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-29131", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, ], title: "CVE-2024-29131", }, { cve: "CVE-2024-29133", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-29133", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-29133", }, { cve: "CVE-2024-33599", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33599", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33599", }, { cve: "CVE-2024-33600", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33600", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33600", }, { cve: "CVE-2024-33601", cwe: { id: "CWE-703", name: "Improper Check or Handling of Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "other", text: "Reachable Assertion", title: "CWE-617", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33601", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33601", }, { cve: "CVE-2024-33602", cwe: { id: "CWE-466", name: "Return of Pointer Value Outside of Expected Range", }, notes: [ { category: "other", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33602", }, { cve: "CVE-2024-34064", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-34064", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json", }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085", ], }, ], title: "CVE-2024-34064", }, { cve: "CVE-2024-34750", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Handling of Exceptional Conditions", title: "CWE-755", }, { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-34750", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085", ], }, ], title: "CVE-2024-34750", }, { cve: "CVE-2024-35195", cwe: { id: "CWE-670", name: "Always-Incorrect Control Flow Implementation", }, notes: [ { category: "other", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, ], product_status: { known_affected: [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-35195", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json", }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-35195", }, { cve: "CVE-2024-37370", cwe: { id: "CWE-130", name: "Improper Handling of Length Parameter Inconsistency", }, notes: [ { category: "other", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", ], }, references: [ { category: "self", summary: "CVE-2024-37370", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", ], }, ], title: "CVE-2024-37370", }, { cve: "CVE-2024-37371", cwe: { id: "CWE-130", name: "Improper Handling of Length Parameter Inconsistency", }, notes: [ { category: "other", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-37371", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-37371", }, { cve: "CVE-2024-37891", cwe: { id: "CWE-669", name: "Incorrect Resource Transfer Between Spheres", }, notes: [ { category: "other", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, ], product_status: { known_affected: [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-37891", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-37891", }, { cve: "CVE-2024-38475", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Improper Encoding or Escaping of Output", title: "CWE-116", }, { category: "other", text: "Path Traversal: '.../...//'", title: "CWE-35", }, { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "other", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "other", text: "Use of Hard-coded Credentials", title: "CWE-798", }, { category: "other", text: "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", title: "CWE-338", }, ], references: [ { category: "self", summary: "CVE-2024-38475", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json", }, ], title: "CVE-2024-38475", }, { cve: "CVE-2024-38807", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, notes: [ { category: "other", text: "Improper Verification of Cryptographic Signature", title: "CWE-347", }, ], product_status: { known_affected: [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-38807", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json", }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-38807", }, { cve: "CVE-2024-38809", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1673393", ], }, references: [ { category: "self", summary: "CVE-2024-38809", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json", }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-1673393", ], }, ], title: "CVE-2024-38809", }, { cve: "CVE-2024-38816", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "other", text: "Relative Path Traversal", title: "CWE-23", }, ], product_status: { known_affected: [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225", ], }, references: [ { category: "self", summary: "CVE-2024-38816", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225", ], }, ], title: "CVE-2024-38816", }, { cve: "CVE-2024-38819", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, ], product_status: { known_affected: [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", ], }, references: [ { category: "self", summary: "CVE-2024-38819", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", ], }, ], title: "CVE-2024-38819", }, { cve: "CVE-2024-38820", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, ], product_status: { known_affected: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241", ], }, references: [ { category: "self", summary: "CVE-2024-38820", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241", ], }, ], title: "CVE-2024-38820", }, { cve: "CVE-2024-38827", cwe: { id: "CWE-639", name: "Authorization Bypass Through User-Controlled Key", }, notes: [ { category: "other", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-38827", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json", }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-38827", }, { cve: "CVE-2024-38998", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-38998", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, ], title: "CVE-2024-38998", }, { cve: "CVE-2024-38999", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-38999", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, ], title: "CVE-2024-38999", }, { cve: "CVE-2024-41817", cwe: { id: "CWE-427", name: "Uncontrolled Search Path Element", }, notes: [ { category: "other", text: "Uncontrolled Search Path Element", title: "CWE-427", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-41817", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079", ], }, ], title: "CVE-2024-41817", }, { cve: "CVE-2024-45490", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "other", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-45490", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, ], title: "CVE-2024-45490", }, { cve: "CVE-2024-45491", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-45491", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, ], title: "CVE-2024-45491", }, { cve: "CVE-2024-45492", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-45492", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590", ], }, ], title: "CVE-2024-45492", }, { cve: "CVE-2024-47535", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-47535", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-47535", }, { cve: "CVE-2024-47554", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-47554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-47554", }, { cve: "CVE-2024-47561", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], product_status: { known_affected: [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-47561", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-47561", }, { cve: "CVE-2024-47803", cwe: { id: "CWE-209", name: "Generation of Error Message Containing Sensitive Information", }, notes: [ { category: "other", text: "Generation of Error Message Containing Sensitive Information", title: "CWE-209", }, ], product_status: { known_affected: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-47803", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, ], title: "CVE-2024-47803", }, { cve: "CVE-2024-47804", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, notes: [ { category: "other", text: "Incorrect Authorization", title: "CWE-863", }, { category: "other", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, { category: "other", text: "Access of Resource Using Incompatible Type ('Type Confusion')", title: "CWE-843", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-47804", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, ], title: "CVE-2024-47804", }, { cve: "CVE-2024-49766", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2024-49766", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209", ], }, ], title: "CVE-2024-49766", }, { cve: "CVE-2024-49767", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, references: [ { category: "self", summary: "CVE-2024-49767", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, ], title: "CVE-2024-49767", }, { cve: "CVE-2024-50379", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-50379", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-50602", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-50602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085", ], }, ], title: "CVE-2024-50602", }, { cve: "CVE-2024-53677", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "other", text: "Unrestricted Upload of File with Dangerous Type", title: "CWE-434", }, { category: "other", text: "Files or Directories Accessible to External Parties", title: "CWE-552", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-53677", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json", }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-53677", }, { cve: "CVE-2024-54677", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-54677", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-21542", product_status: { known_affected: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2025-21542", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json", }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2025-21542", }, { cve: "CVE-2025-21544", product_status: { known_affected: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2025-21544", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json", }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2025-21544", }, { cve: "CVE-2025-21554", product_status: { known_affected: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2025-21554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2025-21554", }, ], }
ncsc-2025-0041
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "F5 heeft kwetsbaarheden verholpen in BIG-IP.", title: "Feiten", }, { category: "description", text: "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van een beveiligingsmaatregel\n- Uitvoer van willekeurige code (Root/admin)\n- Uitvoer van willekeurige code (Gebruiker)\n- Toegang tot gevoelige gegevens", title: "Interpretaties", }, { category: "description", text: "F5 heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Missing Release of Resource after Effective Lifetime", title: "CWE-772", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, { category: "general", text: "Untrusted Search Path", title: "CWE-426", }, { category: "general", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", title: "CWE-77", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "Protection Mechanism Failure", title: "CWE-693", }, { category: "general", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "general", text: "Missing Release of Memory after Effective Lifetime", title: "CWE-401", }, { category: "general", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", title: "CWE-78", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000138757", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000138932", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000139656", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000139778", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140578", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140920", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140933", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140947", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140950", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000141003", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000148587", }, ], title: "Kwetsbaarheden verholpen in F5 BIG-IP", tracking: { current_release_date: "2025-02-11T06:51:17.629249Z", id: "NCSC-2025-0041", initial_release_date: "2025-02-07T07:38:11.981975Z", revision_history: [ { date: "2025-02-07T07:38:11.981975Z", number: "0", summary: "Initiele versie", }, { date: "2025-02-11T06:51:17.629249Z", number: "1", summary: "Door een technisch issue is deze advisory eerder verstuurd met een invalide signature, waardoor automatische verwerking mogelijk verstoord is. Deze update verhelpt dat. Er is verder geen inhoudelijke wijziging.", }, ], status: "final", version: "1.0.1", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "big-ip", product: { name: "big-ip", product_id: "CSAFPID-310988", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next", product: { name: "big-ip_next", product_id: "CSAFPID-636427", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next_central_manager", product: { name: "big-ip_next_central_manager", product_id: "CSAFPID-1620063", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next_central_manager:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next_cnf", product: { name: "big-ip_next_cnf", product_id: "CSAFPID-636429", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next_cnf:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next_spk", product: { name: "big-ip_next_spk", product_id: "CSAFPID-636428", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next_spk:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "nginx_open_source", product: { name: "nginx_open_source", product_id: "CSAFPID-842689", product_identification_helper: { cpe: "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "nginx_plus", product: { name: "nginx_plus", product_id: "CSAFPID-842688", product_identification_helper: { cpe: "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "f5", }, ], }, vulnerabilities: [ { cve: "CVE-2014-0064", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0064", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0064.json", }, ], title: "CVE-2014-0064", }, { cve: "CVE-2014-0065", product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0065", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0065.json", }, ], title: "CVE-2014-0065", }, { cve: "CVE-2014-0066", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0066", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0066.json", }, ], title: "CVE-2014-0066", }, { cve: "CVE-2014-0067", product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0067", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0067.json", }, ], title: "CVE-2014-0067", }, { cve: "CVE-2019-5010", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2019-5010", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-5010.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2019-5010", }, { cve: "CVE-2019-16056", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "other", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2019-16056", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-16056.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2019-16056", }, { cve: "CVE-2022-26488", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, notes: [ { category: "other", text: "Untrusted Search Path", title: "CWE-426", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2022-26488", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26488.json", }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2022-26488", }, { cve: "CVE-2024-36242", cwe: { id: "CWE-693", name: "Protection Mechanism Failure", }, notes: [ { category: "other", text: "Protection Mechanism Failure", title: "CWE-693", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2024-36242", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36242.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2024-36242", }, { cve: "CVE-2024-38660", cwe: { id: "CWE-693", name: "Protection Mechanism Failure", }, notes: [ { category: "other", text: "Protection Mechanism Failure", title: "CWE-693", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2024-38660", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38660.json", }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2024-38660", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-20029", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, notes: [ { category: "other", text: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", title: "CWE-78", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-20029", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20029.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-20029", }, { cve: "CVE-2025-20045", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-20045", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20045.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-20045", }, { cve: "CVE-2025-20058", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-20058", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20058.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-20058", }, { cve: "CVE-2025-21087", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-21087", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21087.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-21087", }, { cve: "CVE-2025-21091", cwe: { id: "CWE-401", name: "Missing Release of Memory after Effective Lifetime", }, notes: [ { category: "other", text: "Missing Release of Memory after Effective Lifetime", title: "CWE-401", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-21091", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21091.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-21091", }, { cve: "CVE-2025-22846", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-22846", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22846.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-22846", }, { cve: "CVE-2025-22891", cwe: { id: "CWE-772", name: "Missing Release of Resource after Effective Lifetime", }, notes: [ { category: "other", text: "Missing Release of Resource after Effective Lifetime", title: "CWE-772", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-22891", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22891.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-22891", }, { cve: "CVE-2025-23239", cwe: { id: "CWE-77", name: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", }, notes: [ { category: "other", text: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", title: "CWE-77", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23239", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23239.json", }, ], scores: [ { cvss_v3: { baseScore: 8.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23239", }, { cve: "CVE-2025-23412", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "other", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23412", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23412.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23412", }, { cve: "CVE-2025-23413", cwe: { id: "CWE-532", name: "Insertion of Sensitive Information into Log File", }, notes: [ { category: "other", text: "Insertion of Sensitive Information into Log File", title: "CWE-532", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23413", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23413.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23413", }, { cve: "CVE-2025-23415", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "other", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23415", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23415.json", }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23415", }, { cve: "CVE-2025-23419", cwe: { id: "CWE-287", name: "Improper Authentication", }, notes: [ { category: "other", text: "Improper Authentication", title: "CWE-287", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23419", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23419.json", }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23419", }, { cve: "CVE-2025-24312", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24312", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24312.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24312", }, { cve: "CVE-2025-24319", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24319", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24319.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24319", }, { cve: "CVE-2025-24320", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24320", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24320.json", }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24320", }, { cve: "CVE-2025-24326", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24326", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24326.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24326", }, { cve: "CVE-2025-24497", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "other", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24497", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24497.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24497", }, ], }
ncsc-2025-0119
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "SAP heeft kwetsbaarheden verholpen in verschillende producten, waaronder SAP Financial Consolidation, SAP Landscape Transformation, SAP NetWeaver Application Server ABAP, SAP Commerce Cloud, SAP ERP BW, SAP BusinessObjects Business Intelligence Platform, SAP KMC WPC, SAP Solution Manager, SAP S4CORE, en SAP CRM.", title: "Feiten", }, { category: "description", text: "De uitgebrachte paches bevatten een aantal kritieke kwetsbaarheden met de kenmerken CVE-2025-30016, CVE-2025-31330 en CVE-2025-27429.\n\nDe kwetsbaarheid met kenmerk CVE-2025-30016 is een kritieke authenticatie-bypass in SAP Financial Consolidation, die ongeauthenticeerde aanvallers toegang geeft tot het Admin-account. \n\nSAP Landscape Transformation heeft een kwetsbaarheid met kenmerk CVE-2025-31330, die het mogelijk maakt voor aanvallers met gebruikersprivileges om willekeurige ABAP-code in te voegen.\n\nDe kwetsbaarheid met kenmerk CVE-2025-27429 in SAP S/4HANA (Private Cloud) stelt een aanvaller met gebruikersprivileges in staat om willekeurige ABAP-code in de RFC-functiemodule te injecteren en autorisatiecontroles te omzeilen, waardoor de vertrouwelijkheid, integriteit en beschikbaarheid van het systeem in gevaar komen.\n\n\nSAP NetWeaver Application Server ABAP heeft een Mixed Dynamic RFC Destination-kwetsbaarheid die kan leiden tot blootstelling van gevoelige inloggegevens. Daarnaast zijn er kwetsbaarheden in SAP Commerce Cloud die de vertrouwelijkheid en integriteit van gegevens in gevaar kunnen brengen. De kwetsbaarheden in SAP ERP BW en SAP BusinessObjects kunnen leiden tot ongeautoriseerde uitvoering van commando's en wijziging van bestanden. De directory traversal-kwetsbaarheden in SAP Capital Yield Tax Management en SAP Solution Manager stellen aanvallers in staat om gevoelige informatie te verkrijgen. De SSRF-kwetsbaarheid in SAP CRM en SAP S/4HANA kan de vertrouwelijkheid van interne netwerkbronnen in gevaar brengen. ", title: "Interpretaties", }, { category: "description", text: "SAP heeft patches uitgebracht om de kwetsbaarheden in de genoemde producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Path Traversal: '.../...//'", title: "CWE-35", }, { category: "general", text: "Insecure Inherited Permissions", title: "CWE-277", }, { category: "general", text: "Storage of Sensitive Data in a Mechanism without Access Control", title: "CWE-921", }, { category: "general", text: "External Control of Assumed-Immutable Web Parameter", title: "CWE-472", }, { category: "general", text: "Cleartext Transmission of Sensitive Information", title: "CWE-319", }, { category: "general", text: "Missing Authorization", title: "CWE-862", }, { category: "general", text: "Server-Side Request Forgery (SSRF)", title: "CWE-918", }, { category: "general", text: "Incorrect Authorization", title: "CWE-863", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - certbundde", url: "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2025.html", }, ], title: "Kwetsbaarheden verholpen in SAP-producten", tracking: { current_release_date: "2025-04-09T09:12:05.705017Z", generator: { date: "2025-02-25T15:15:00Z", engine: { name: "V.A.", version: "1.0", }, }, id: "NCSC-2025-0119", initial_release_date: "2025-04-09T09:12:05.705017Z", revision_history: [ { date: "2025-04-09T09:12:05.705017Z", number: "1.0.0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/10.0", product: { name: "vers:unknown/10.0", product_id: "CSAFPID-426681", product_identification_helper: { cpe: "cpe:2.3:a:sap:sap_businessobjects_financial_consolidation:10.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:unknown/10.0.0.1933", product: { name: "vers:unknown/10.0.0.1933", product_id: "CSAFPID-367586", }, }, { category: "product_version_range", name: "vers:unknown/10.1", product: { name: "vers:unknown/10.1", product_id: "CSAFPID-426682", product_identification_helper: { cpe: "cpe:2.3:a:sap:sap_businessobjects_financial_consolidation:10.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-336862", }, }, ], category: "product_name", name: "BusinessObjects Financial Consolidation", }, { branches: [ { category: "product_version_range", name: "vers:unknown/2.00", product: { name: "vers:unknown/2.00", product_id: "CSAFPID-426483", product_identification_helper: { cpe: "cpe:2.3:a:sap_se:sap_erp_financials_information_system:2.00:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "ERP Financials Information System", }, { branches: [ { category: "product_version_range", name: "vers:unknown/6.0", product: { name: "vers:unknown/6.0", product_id: "CSAFPID-447161", }, }, { category: "product_version_range", name: "vers:unknown/6.03", product: { name: "vers:unknown/6.03", product_id: "CSAFPID-447167", }, }, { category: "product_version_range", name: "vers:unknown/6.04", product: { name: "vers:unknown/6.04", product_id: "CSAFPID-447158", }, }, { category: "product_version_range", name: "vers:unknown/6.05", product: { name: "vers:unknown/6.05", product_id: "CSAFPID-447155", }, }, { category: "product_version_range", name: "vers:unknown/6.06", product: { name: "vers:unknown/6.06", product_id: "CSAFPID-447160", }, }, { category: "product_version_range", name: "vers:unknown/6.16", product: { name: "vers:unknown/6.16", product_id: "CSAFPID-447163", }, }, { category: "product_version_range", name: "vers:unknown/6.17", product: { name: "vers:unknown/6.17", product_id: "CSAFPID-447165", }, }, { category: "product_version_range", name: "vers:unknown/6.18", product: { name: "vers:unknown/6.18", product_id: "CSAFPID-447156", }, }, { category: "product_version_range", name: "vers:unknown/8.0", product: { name: "vers:unknown/8.0", product_id: "CSAFPID-447164", }, }, ], category: "product_name", name: "Enterprise Extension Financial Services", }, { branches: [ { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-710027", }, }, { category: "product_version_range", name: "vers:unknown/6.05", product: { name: "vers:unknown/6.05", product_id: "CSAFPID-426703", }, }, { category: "product_version_range", name: "vers:unknown/6.06", product: { name: "vers:unknown/6.06", product_id: "CSAFPID-426706", }, }, { category: "product_version_range", name: "vers:unknown/6.16", product: { name: "vers:unknown/6.16", product_id: "CSAFPID-426707", }, }, { category: "product_version_range", name: "vers:unknown/6.17", product: { name: "vers:unknown/6.17", product_id: "CSAFPID-426708", }, }, { category: "product_version_range", name: "vers:unknown/6.18", product: { name: "vers:unknown/6.18", product_id: "CSAFPID-426704", }, }, { category: "product_version_range", name: "vers:unknown/8.0", product: { name: "vers:unknown/8.0", product_id: "CSAFPID-426705", }, }, ], category: "product_name", name: "Enterprise Financial Services", }, { branches: [ { category: "product_version_range", name: "vers:unknown/10.0", product: { name: "vers:unknown/10.0", product_id: "CSAFPID-447141", }, }, { category: "product_version_range", name: "vers:unknown/10.1", product: { name: "vers:unknown/10.1", product_id: "CSAFPID-447140", }, }, { category: "product_version_range", name: "vers:unknown/1010", product: { name: "vers:unknown/1010", product_id: "CSAFPID-847883", product_identification_helper: { cpe: "cpe:2.3:a:sap:financial_consolidation:1010:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Financial Consolidation", }, { branches: [ { category: "product_version_range", name: "vers:unknown/10.1", product: { name: "vers:unknown/10.1", product_id: "CSAFPID-426837", }, }, ], category: "product_name", name: "Financial Consolidation Cube Designer", }, { branches: [ { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-1176052", }, }, { category: "product_version_range", name: "vers:unknown/unknown", product: { name: "vers:unknown/unknown", product_id: "CSAFPID-1333259", }, }, ], category: "product_name", name: "NetWeaver", }, { branches: [ { category: "product_version_range", name: "vers:unknown/7.50", product: { name: "vers:unknown/7.50", product_id: "CSAFPID-2351307", }, }, ], category: "product_name", name: "NetWeaver (SAP Enterprise Portal)", }, { branches: [ { category: "product_version_range", name: "vers:unknown/700", product: { name: "vers:unknown/700", product_id: "CSAFPID-2538790", }, }, { category: "product_version_range", name: "vers:unknown/701", product: { name: "vers:unknown/701", product_id: "CSAFPID-2538791", }, }, { category: "product_version_range", name: "vers:unknown/702", product: { name: "vers:unknown/702", product_id: "CSAFPID-2538792", }, }, { category: "product_version_range", name: "vers:unknown/731", product: { name: "vers:unknown/731", product_id: "CSAFPID-2538793", }, }, { category: "product_version_range", name: "vers:unknown/740", product: { name: "vers:unknown/740", product_id: "CSAFPID-2538794", }, }, { category: "product_version_range", name: "vers:unknown/750", product: { name: "vers:unknown/750", product_id: "CSAFPID-2538799", }, }, { category: "product_version_range", name: "vers:unknown/751", product: { name: "vers:unknown/751", product_id: "CSAFPID-2538800", }, }, { category: "product_version_range", name: "vers:unknown/752", product: { name: "vers:unknown/752", product_id: "CSAFPID-2538801", }, }, { category: "product_version_range", name: "vers:unknown/753", product: { name: "vers:unknown/753", product_id: "CSAFPID-2538802", }, }, { category: "product_version_range", name: "vers:unknown/754", product: { name: "vers:unknown/754", product_id: "CSAFPID-2538803", }, }, { category: "product_version_range", name: "vers:unknown/755", product: { name: "vers:unknown/755", product_id: "CSAFPID-2538804", }, }, { category: "product_version_range", name: "vers:unknown/756", product: { name: "vers:unknown/756", product_id: "CSAFPID-2538805", }, }, { category: "product_version_range", name: "vers:unknown/757", product: { name: "vers:unknown/757", product_id: "CSAFPID-2538806", }, }, ], category: "product_name", name: "NetWeaver AS ABAP (BSP Framework)", }, { branches: [ { category: "product_version_range", name: "vers:unknown/700", product: { name: "vers:unknown/700", product_id: "CSAFPID-2538773", }, }, { category: "product_version_range", name: "vers:unknown/701", product: { name: "vers:unknown/701", product_id: "CSAFPID-2538774", }, }, { category: "product_version_range", name: "vers:unknown/702", product: { name: "vers:unknown/702", product_id: "CSAFPID-2538775", }, }, { category: "product_version_range", name: "vers:unknown/731", product: { name: "vers:unknown/731", product_id: "CSAFPID-2538776", }, }, { category: "product_version_range", name: "vers:unknown/740", product: { name: "vers:unknown/740", product_id: "CSAFPID-2538777", }, }, { category: "product_version_range", name: "vers:unknown/750", product: { name: "vers:unknown/750", product_id: "CSAFPID-2538778", }, }, { category: "product_version_range", name: "vers:unknown/751", product: { name: "vers:unknown/751", product_id: "CSAFPID-2538779", }, }, { category: "product_version_range", name: "vers:unknown/752", product: { name: "vers:unknown/752", product_id: "CSAFPID-2538780", }, }, { category: "product_version_range", name: "vers:unknown/75c", product: { name: "vers:unknown/75c", product_id: "CSAFPID-2538781", }, }, ], category: "product_name", name: "NetWeaver AS ABAP (Business Server Pages application)", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-1307450", }, }, { category: "product_version_range", name: "vers:unknown/1808", product: { name: "vers:unknown/1808", product_id: "CSAFPID-1297130", }, }, { category: "product_version_range", name: "vers:unknown/1811", product: { name: "vers:unknown/1811", product_id: "CSAFPID-1297107", }, }, { category: "product_version_range", name: "vers:unknown/1905", product: { name: "vers:unknown/1905", product_id: "CSAFPID-1230533", }, }, { category: "product_version_range", name: "vers:unknown/2001 zh", product: { name: "vers:unknown/2001 zh", product_id: "CSAFPID-1921506", }, }, { category: "product_version_range", name: "vers:unknown/2005", product: { name: "vers:unknown/2005", product_id: "CSAFPID-1230555", }, }, { category: "product_version_range", name: "vers:unknown/2011", product: { name: "vers:unknown/2011", product_id: "CSAFPID-1230719", }, }, { category: "product_version_range", name: "vers:unknown/2105", product: { name: "vers:unknown/2105", product_id: "CSAFPID-1230702", }, }, { category: "product_version_range", name: "vers:unknown/2205", product: { name: "vers:unknown/2205", product_id: "CSAFPID-1304671", }, }, { category: "product_version_range", name: "vers:unknown/2211", product: { name: "vers:unknown/2211", product_id: "CSAFPID-1921487", }, }, { category: "product_version_range", name: "vers:unknown/6.7", product: { name: "vers:unknown/6.7", product_id: "CSAFPID-1297186", }, }, ], category: "product_name", name: "Commerce", }, { branches: [ { category: "product_version_range", name: "vers:unknown/2205 hy_com", product: { name: "vers:unknown/2205 hy_com", product_id: "CSAFPID-2473272", }, }, { category: "product_version_range", name: "vers:unknown/2211", product: { name: "vers:unknown/2211", product_id: "CSAFPID-2473273", }, }, { category: "product_version_range", name: "vers:unknown/none", product: { name: "vers:unknown/none", product_id: "CSAFPID-1306891", }, }, ], category: "product_name", name: "Commerce Cloud", }, { branches: [ { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-1306888", }, }, ], category: "product_name", name: "Landscape Management", }, { branches: [ { category: "product_version_range", name: "vers:unknown/7.0", product: { name: "vers:unknown/7.0", product_id: "CSAFPID-2352521", }, }, { category: "product_version_range", name: "vers:unknown/7.10", product: { name: "vers:unknown/7.10", product_id: "CSAFPID-2352520", }, }, { category: "product_version_range", name: "vers:unknown/7.20", product: { name: "vers:unknown/7.20", product_id: "CSAFPID-1304029", }, }, { category: "product_version_range", name: "vers:unknown/7.40", product: { name: "vers:unknown/7.40", product_id: "CSAFPID-2352519", }, }, { category: "product_version_range", name: "vers:unknown/720", product: { name: "vers:unknown/720", product_id: "CSAFPID-2539577", }, }, { category: "product_version_range", name: "vers:unknown/740", product: { name: "vers:unknown/740", product_id: "CSAFPID-2352518", }, }, ], category: "product_name", name: "Solution Manager", }, ], category: "product_family", name: "SAP", }, { branches: [ { category: "product_version_range", name: "vers:unknown/com_cloud 2211", product: { name: "vers:unknown/com_cloud 2211", product_id: "CSAFPID-1988023", }, }, { category: "product_version_range", name: "vers:unknown/hy_com 2205", product: { name: "vers:unknown/hy_com 2205", product_id: "CSAFPID-1988024", }, }, ], category: "product_name", name: "Commerce", }, { branches: [ { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-1175835", }, }, { category: "product_version_range", name: "vers:unknown/2211", product: { name: "vers:unknown/2211", product_id: "CSAFPID-2632442", }, }, { category: "product_version_range", name: "vers:unknown/com_cloud 2211", product: { name: "vers:unknown/com_cloud 2211", product_id: "CSAFPID-2632443", }, }, { category: "product_version_range", name: "vers:unknown/com_cloud 2211|hy_com 2205", product: { name: "vers:unknown/com_cloud 2211|hy_com 2205", product_id: "CSAFPID-1425816", }, }, { category: "product_version_range", name: "vers:unknown/hy_com 2205", product: { name: "vers:unknown/hy_com 2205", product_id: "CSAFPID-2632444", }, }, { category: "product_version_range", name: "vers:unknown/unknown", product: { name: "vers:unknown/unknown", product_id: "CSAFPID-1332128", }, }, ], category: "product_name", name: "Commerce Cloud", }, { branches: [ { category: "product_version_range", name: "vers:unknown/1808", product: { name: "vers:unknown/1808", product_id: "CSAFPID-605062", }, }, { category: "product_version_range", name: "vers:unknown/1811", product: { name: "vers:unknown/1811", product_id: "CSAFPID-605061", }, }, { category: "product_version_range", name: "vers:unknown/1905", product: { name: "vers:unknown/1905", product_id: "CSAFPID-605064", }, }, ], category: "product_name", name: "Commerce Data Hub", }, { branches: [ { category: "product_version_range", name: "vers:unknown/7.00", product: { name: "vers:unknown/7.00", product_id: "CSAFPID-345584", }, }, { category: "product_version_range", name: "vers:unknown/7.01", product: { name: "vers:unknown/7.01", product_id: "CSAFPID-345586", }, }, { category: "product_version_range", name: "vers:unknown/7.02", product: { name: "vers:unknown/7.02", product_id: "CSAFPID-345588", }, }, { category: "product_version_range", name: "vers:unknown/7.10", product: { name: "vers:unknown/7.10", product_id: "CSAFPID-345621", }, }, { category: "product_version_range", name: "vers:unknown/7.11", product: { name: "vers:unknown/7.11", product_id: "CSAFPID-345620", }, }, { category: "product_version_range", name: "vers:unknown/7.30", product: { name: "vers:unknown/7.30", product_id: "CSAFPID-345590", }, }, { category: "product_version_range", name: "vers:unknown/7.31", product: { name: "vers:unknown/7.31", product_id: "CSAFPID-345585", }, }, { category: "product_version_range", name: "vers:unknown/7.40", product: { name: "vers:unknown/7.40", product_id: "CSAFPID-345591", }, }, { category: "product_version_range", name: "vers:unknown/7.50", product: { name: "vers:unknown/7.50", product_id: "CSAFPID-345592", }, }, { category: "product_version_range", name: "vers:unknown/7.51", product: { name: "vers:unknown/7.51", product_id: "CSAFPID-345589", }, }, { category: "product_version_range", name: "vers:unknown/7.52", product: { name: "vers:unknown/7.52", product_id: "CSAFPID-345587", }, }, { category: "product_version_range", name: "vers:unknown/7.53", product: { name: "vers:unknown/7.53", product_id: "CSAFPID-426833", }, }, ], category: "product_name", name: "Business Application Software Integrated Solution", }, { branches: [ { category: "product_version_range", name: "vers:unknown/2.0", product: { name: "vers:unknown/2.0", product_id: "CSAFPID-710118", }, }, { category: "product_version_range", name: "vers:unknown/2011_1_710", product: { name: "vers:unknown/2011_1_710", product_id: "CSAFPID-2632409", }, }, { category: "product_version_range", name: "vers:unknown/2011_1_730", product: { name: "vers:unknown/2011_1_730", product_id: "CSAFPID-2632410", }, }, { category: "product_version_range", name: "vers:unknown/2011_1_731", product: { name: "vers:unknown/2011_1_731", product_id: "CSAFPID-2632411", }, }, { category: "product_version_range", name: "vers:unknown/dmis 2011_1_700", product: { name: "vers:unknown/dmis 2011_1_700", product_id: "CSAFPID-2632412", }, }, { category: "product_version_range", name: "vers:unknown/dmis_2011_1_700", product: { name: "vers:unknown/dmis_2011_1_700", product_id: "CSAFPID-2633939", }, }, ], category: "product_name", name: "Landscape Transformation", }, { branches: [ { category: "product_version_range", name: "vers:unknown/7.10", product: { name: "vers:unknown/7.10", product_id: "CSAFPID-426454", }, }, { category: "product_version_range", name: "vers:unknown/7.20", product: { name: "vers:unknown/7.20", product_id: "CSAFPID-426453", }, }, { category: "product_version_range", name: "vers:unknown/7.30", product: { name: "vers:unknown/7.30", product_id: "CSAFPID-426456", }, }, { category: "product_version_range", name: "vers:unknown/7.31", product: { name: "vers:unknown/7.31", product_id: "CSAFPID-426455", }, }, { category: "product_version_range", name: "vers:unknown/7.40", product: { name: "vers:unknown/7.40", product_id: "CSAFPID-426457", }, }, { category: "product_version_range", name: "vers:unknown/7.5", product: { name: "vers:unknown/7.5", product_id: "CSAFPID-1295436", product_identification_helper: { cpe: "cpe:2.3:a:sap:netweaver_system_landscape_directory:7.5:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Netweaver System Landscape Directory", }, { branches: [ { category: "product_version_range", name: "vers:unknown/3.0", product: { name: "vers:unknown/3.0", product_id: "CSAFPID-2118594", }, }, ], category: "product_name", name: "landscape_management", }, { branches: [ { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-1176305", }, }, { category: "product_version_range", name: "vers:unknown/720", product: { name: "vers:unknown/720", product_id: "CSAFPID-2538090", }, }, { category: "product_version_range", name: "vers:unknown/sap_basis 700", product: { name: "vers:unknown/sap_basis 700", product_id: "CSAFPID-2632425", }, }, { category: "product_version_range", name: "vers:unknown/sap_basis 701", product: { name: "vers:unknown/sap_basis 701", product_id: "CSAFPID-2632426", }, }, { category: "product_version_range", name: "vers:unknown/sap_basis 702", product: { name: "vers:unknown/sap_basis 702", product_id: "CSAFPID-2632427", }, }, { category: "product_version_range", name: "vers:unknown/sap_basis 731", product: { name: "vers:unknown/sap_basis 731", product_id: "CSAFPID-2632428", }, }, { category: "product_version_range", name: "vers:unknown/sap_basis 740", product: { name: "vers:unknown/sap_basis 740", product_id: "CSAFPID-2632429", }, }, ], category: "product_name", name: "Solution Manager", }, ], category: "vendor", name: "SAP", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/unknown", product: { name: "vers:unknown/unknown", product_id: "CSAFPID-2364492", product_identification_helper: { cpe: "cpe:/a:atoss:staff_efficiency_suite:-", }, }, }, ], category: "product_name", name: "ATOSS Staff Efficiency Suite", }, ], category: "vendor", name: "ATOSS", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/unknown", product: { name: "vers:unknown/unknown", product_id: "CSAFPID-1330296", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "product_name", name: "Amazon Linux 2", }, ], category: "vendor", name: "Amazon", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/<10.1.34", product: { name: "vers:unknown/<10.1.34", product_id: "CSAFPID-1459777", }, }, { category: "product_version_range", name: "vers:unknown/<11.0.2", product: { name: "vers:unknown/<11.0.2", product_id: "CSAFPID-1459778", }, }, { category: "product_version_range", name: "vers:unknown/<9.0.98", product: { name: "vers:unknown/<9.0.98", product_id: "CSAFPID-1459779", }, }, ], category: "product_name", name: "Tomcat", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/>=10.1.0 milestone1|<=10.1.33", product: { name: "vers:unknown/>=10.1.0 milestone1|<=10.1.33", product_id: "CSAFPID-1861039", }, }, { category: "product_version_range", name: "vers:unknown/>=11.0.0 milestone1|<=11.0.1", product: { name: "vers:unknown/>=11.0.0 milestone1|<=11.0.1", product_id: "CSAFPID-1861040", }, }, { category: "product_version_range", name: "vers:unknown/>=9.0.0 milestone1|<=9.0.97", product: { name: "vers:unknown/>=9.0.0 milestone1|<=9.0.97", product_id: "CSAFPID-1861041", }, }, ], category: "product_name", name: "Tomcat", }, ], category: "product_family", name: "Apache", }, { branches: [ { category: "product_version_range", name: "vers:unknown/10.1.0", product: { name: "vers:unknown/10.1.0", product_id: "CSAFPID-2140760", }, }, { category: "product_version_range", name: "vers:unknown/10.1.1", product: { name: "vers:unknown/10.1.1", product_id: "CSAFPID-2140804", }, }, { category: "product_version_range", name: "vers:unknown/10.1.10", product: { name: "vers:unknown/10.1.10", product_id: "CSAFPID-2140795", }, }, { category: "product_version_range", name: "vers:unknown/10.1.11", product: { name: "vers:unknown/10.1.11", product_id: "CSAFPID-2140773", }, }, { category: "product_version_range", name: "vers:unknown/10.1.12", product: { name: "vers:unknown/10.1.12", product_id: "CSAFPID-2140818", }, }, { category: "product_version_range", name: "vers:unknown/10.1.13", product: { name: "vers:unknown/10.1.13", product_id: "CSAFPID-2140755", }, }, { category: "product_version_range", name: "vers:unknown/10.1.14", product: { name: "vers:unknown/10.1.14", product_id: "CSAFPID-2140803", }, }, { category: "product_version_range", name: "vers:unknown/10.1.15", product: { name: "vers:unknown/10.1.15", product_id: "CSAFPID-2140852", }, }, { category: "product_version_range", name: "vers:unknown/10.1.16", product: { name: "vers:unknown/10.1.16", product_id: "CSAFPID-2140842", }, }, { category: "product_version_range", name: "vers:unknown/10.1.17", product: { name: "vers:unknown/10.1.17", product_id: "CSAFPID-2140814", }, }, { category: "product_version_range", name: "vers:unknown/10.1.18", product: { name: "vers:unknown/10.1.18", product_id: "CSAFPID-2140749", }, }, { category: "product_version_range", name: "vers:unknown/10.1.19", product: { name: "vers:unknown/10.1.19", product_id: "CSAFPID-2140796", }, }, { category: "product_version_range", name: "vers:unknown/10.1.2", product: { name: "vers:unknown/10.1.2", product_id: "CSAFPID-2140856", }, }, { category: "product_version_range", name: "vers:unknown/10.1.20", product: { name: "vers:unknown/10.1.20", product_id: "CSAFPID-2140834", }, }, { category: "product_version_range", name: "vers:unknown/10.1.21", product: { name: "vers:unknown/10.1.21", product_id: "CSAFPID-2140851", }, }, { category: "product_version_range", name: "vers:unknown/10.1.22", product: { name: "vers:unknown/10.1.22", product_id: "CSAFPID-2140742", }, }, { category: "product_version_range", name: "vers:unknown/10.1.23", product: { name: "vers:unknown/10.1.23", product_id: "CSAFPID-2140825", }, }, ], category: "product_name", name: "tomcat", }, ], category: "vendor", name: "Apache", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/103", product: { name: "vers:unknown/103", product_id: "CSAFPID-2631681", }, }, { category: "product_version_range", name: "vers:unknown/104", product: { name: "vers:unknown/104", product_id: "CSAFPID-2631682", }, }, { category: "product_version_range", name: "vers:unknown/105", product: { name: "vers:unknown/105", product_id: "CSAFPID-2631683", }, }, { category: "product_version_range", name: "vers:unknown/106", product: { name: "vers:unknown/106", product_id: "CSAFPID-2631684", }, }, { category: "product_version_range", name: "vers:unknown/107", product: { name: "vers:unknown/107", product_id: "CSAFPID-2631685", }, }, { category: "product_version_range", name: "vers:unknown/108", product: { name: "vers:unknown/108", product_id: "CSAFPID-2631686", }, }, { category: "product_version_range", name: "vers:unknown/s4core102", product: { name: "vers:unknown/s4core102", product_id: "CSAFPID-2631680", }, }, ], category: "product_name", name: "SAP S/4HANA (Private Cloud)", }, { branches: [ { category: "product_version_range", name: "vers:unknown/2011_1_710", product: { name: "vers:unknown/2011_1_710", product_id: "CSAFPID-2631732", }, }, { category: "product_version_range", name: "vers:unknown/2011_1_730", product: { name: "vers:unknown/2011_1_730", product_id: "CSAFPID-2631733", }, }, { category: "product_version_range", name: "vers:unknown/2011_1_731", product: { name: "vers:unknown/2011_1_731", product_id: "CSAFPID-2631734", }, }, { category: "product_version_range", name: "vers:unknown/dmis2011_1_700", product: { name: "vers:unknown/dmis2011_1_700", product_id: "CSAFPID-2631731", }, }, ], category: "product_name", name: "SAP Landscape Transformation (Analysis Platform)", }, { branches: [ { category: "product_version_range", name: "vers:unknown/lm-sld 7.5", product: { name: "vers:unknown/lm-sld 7.5", product_id: "CSAFPID-1295163", }, }, ], category: "product_name", name: "SAP NetWeaver AS Java (System Landscape Directory)", }, ], category: "vendor", name: "SAP_SE", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/*", product: { name: "vers:unknown/*", product_id: "CSAFPID-735564", }, }, { category: "product_version_range", name: "vers:unknown/3.0", product: { name: "vers:unknown/3.0", product_id: "CSAFPID-446586", product_identification_helper: { cpe: "cpe:2.3:a:sap:landscape_management:3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:unknown/3.00", product: { name: "vers:unknown/3.00", product_id: "CSAFPID-1111431", }, }, ], category: "product_name", name: "landscape_management", }, { branches: [ { category: "product_version_range", name: "vers:unknown/1.0", product: { name: "vers:unknown/1.0", product_id: "CSAFPID-710125", }, }, { category: "product_version_range", name: "vers:unknown/2.0", product: { name: "vers:unknown/2.0", product_id: "CSAFPID-710119", }, }, { category: "product_version_range", name: "vers:unknown/3.0", product: { name: "vers:unknown/3.0", product_id: "CSAFPID-710115", }, }, ], category: "product_name", name: "landscape_transformation_replication_server", }, ], category: "vendor", name: "sap", }, ], }, vulnerabilities: [ { cve: "CVE-2025-30016", cwe: { id: "CWE-921", name: "Storage of Sensitive Data in a Mechanism without Access Control", }, notes: [ { category: "other", text: "Storage of Sensitive Data in a Mechanism without Access Control", title: "CWE-921", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-30016", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30016.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-30016", }, { cve: "CVE-2025-31330", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-31330", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31330.json", }, ], scores: [ { cvss_v3: { baseScore: 9.9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-31330", }, { cve: "CVE-2025-23186", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-23186", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23186.json", }, ], scores: [ { cvss_v3: { baseScore: 8.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-23186", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-30014", cwe: { id: "CWE-35", name: "Path Traversal: '.../...//'", }, notes: [ { category: "other", text: "Path Traversal: '.../...//'", title: "CWE-35", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-30014", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30014.json", }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-30014", }, { cve: "CVE-2025-27428", cwe: { id: "CWE-862", name: "Missing Authorization", }, notes: [ { category: "other", text: "Missing Authorization", title: "CWE-862", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-27428", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27428.json", }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-27428", }, { cve: "CVE-2025-26654", cwe: { id: "CWE-319", name: "Cleartext Transmission of Sensitive Information", }, notes: [ { category: "other", text: "Cleartext Transmission of Sensitive Information", title: "CWE-319", }, { category: "general", text: "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-26654", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26654.json", }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-26654", }, { cve: "CVE-2025-30013", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-30013", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30013.json", }, ], title: "CVE-2025-30013", }, { cve: "CVE-2025-31332", cwe: { id: "CWE-277", name: "Insecure Inherited Permissions", }, notes: [ { category: "other", text: "Insecure Inherited Permissions", title: "CWE-277", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-31332", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31332.json", }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-31332", }, { cve: "CVE-2025-26657", cwe: { id: "CWE-862", name: "Missing Authorization", }, notes: [ { category: "other", text: "Missing Authorization", title: "CWE-862", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-26657", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26657.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-26657", }, { cve: "CVE-2025-26653", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-26653", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26653.json", }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-26653", }, { cve: "CVE-2025-30017", cwe: { id: "CWE-862", name: "Missing Authorization", }, notes: [ { category: "other", text: "Missing Authorization", title: "CWE-862", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-30017", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30017.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-30017", }, { cve: "CVE-2025-31333", cwe: { id: "CWE-472", name: "External Control of Assumed-Immutable Web Parameter", }, notes: [ { category: "other", text: "External Control of Assumed-Immutable Web Parameter", title: "CWE-472", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-31333", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31333.json", }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-31333", }, { cve: "CVE-2025-27437", cwe: { id: "CWE-862", name: "Missing Authorization", }, notes: [ { category: "other", text: "Missing Authorization", title: "CWE-862", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-27437", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27437.json", }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-27437", }, { cve: "CVE-2025-31331", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, notes: [ { category: "other", text: "Incorrect Authorization", title: "CWE-863", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-31331", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31331.json", }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-31331", }, { cve: "CVE-2025-27435", cwe: { id: "CWE-862", name: "Missing Authorization", }, notes: [ { category: "other", text: "Missing Authorization", title: "CWE-862", }, { category: "general", text: "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-27435", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27435.json", }, ], title: "CVE-2025-27435", }, { cve: "CVE-2025-30015", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-30015", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30015.json", }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-30015", }, { cve: "CVE-2025-27430", cwe: { id: "CWE-918", name: "Server-Side Request Forgery (SSRF)", }, notes: [ { category: "other", text: "Server-Side Request Forgery (SSRF)", title: "CWE-918", }, ], product_status: { known_affected: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, references: [ { category: "self", summary: "CVE-2025-27430", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27430.json", }, ], scores: [ { cvss_v3: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429", ], }, ], title: "CVE-2025-27430", }, ], }
ncsc-2025-0124
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die variëren van 4.3 tot 9.8, wat wijst op significante risico's voor de beschikbaarheid en vertrouwelijkheid van de systemen.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Path Equivalence: 'file.name' (Internal Dot)", title: "CWE-44", }, { category: "general", text: "Use of Incorrectly-Resolved Name or Reference", title: "CWE-706", }, { category: "general", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", title: "CWE-444", }, { category: "general", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, { category: "general", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "general", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, { category: "general", text: "Dependency on Vulnerable Third-Party Component", title: "CWE-1395", }, { category: "general", text: "Improper Isolation or Compartmentalization", title: "CWE-653", }, { category: "general", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, { category: "general", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "general", text: "Improper Neutralization of Special Elements Used in a Template Engine", title: "CWE-1336", }, { category: "general", text: "Missing Report of Error Condition", title: "CWE-392", }, { category: "general", text: "Missing Release of Resource after Effective Lifetime", title: "CWE-772", }, { category: "general", text: "Observable Timing Discrepancy", title: "CWE-208", }, { category: "general", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, { category: "general", text: "Acceptance of Extraneous Untrusted Data With Trusted Data", title: "CWE-349", }, { category: "general", text: "Excessive Iteration", title: "CWE-834", }, { category: "general", text: "Incorrect Implementation of Authentication Algorithm", title: "CWE-303", }, { category: "general", text: "Incorrect Permission Assignment for Critical Resource", title: "CWE-732", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')", title: "CWE-917", }, { category: "general", text: "Improper Validation of Syntactic Correctness of Input", title: "CWE-1286", }, { category: "general", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "general", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, { category: "general", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "Divide By Zero", title: "CWE-369", }, { category: "general", text: "Files or Directories Accessible to External Parties", title: "CWE-552", }, { category: "general", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, { category: "general", text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", title: "CWE-362", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Missing Authorization", title: "CWE-862", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "general", text: "Improper Certificate Validation", title: "CWE-295", }, { category: "general", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "general", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "Improper Privilege Management", title: "CWE-269", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd; oracle", url: "https://www.oracle.com/security-alerts/cpuapr2025.html", }, ], title: "Kwetsbaarheden verholpen in Oracle Communications", tracking: { current_release_date: "2025-04-16T08:39:55.217751Z", generator: { date: "2025-02-25T15:15:00Z", engine: { name: "V.A.", version: "1.0", }, }, id: "NCSC-2025-0124", initial_release_date: "2025-04-16T08:39:55.217751Z", revision_history: [ { date: "2025-04-16T08:39:55.217751Z", number: "1.0.0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:unknown/24.2.1", product: { name: "vers:unknown/24.2.1", product_id: "CSAFPID-1838578", }, }, { category: "product_version_range", name: "vers:unknown/24.2.0", product: { name: "vers:unknown/24.2.0", product_id: "CSAFPID-1838586", }, }, ], category: "product_name", name: "Communications Cloud Native Core Binding Support Function", }, { branches: [ { category: "product_version_range", name: "vers:unknown/>=24.2.0|<=24.2.2", product: { name: "vers:unknown/>=24.2.0|<=24.2.2", product_id: "CSAFPID-1838591", }, }, ], category: "product_name", name: "Communications Cloud Native Core Policy", }, { branches: [ { category: "product_version_range", name: "vers:unknown/24.2.1", product: { name: "vers:unknown/24.2.1", product_id: "CSAFPID-1838592", }, }, ], category: "product_name", name: "Communications Cloud Native Core Console", }, { branches: [ { category: "product_version_range", name: "vers:unknown/24.2.0", product: { name: "vers:unknown/24.2.0", product_id: "CSAFPID-1838572", }, }, { category: "product_version_range", name: "vers:unknown/24.2.1", product: { name: "vers:unknown/24.2.1", product_id: "CSAFPID-1838581", }, }, { category: "product_version_range", name: "vers:unknown/24.2.2", product: { name: "vers:unknown/24.2.2", product_id: "CSAFPID-1838584", }, }, ], category: "product_name", name: "Communications Cloud Native Core Security Edge Protection Proxy", }, { branches: [ { category: "product_version_range", name: "vers:unknown/>=6.0|<=6.1", product: { name: "vers:unknown/>=6.0|<=6.1", product_id: "CSAFPID-2698355", }, }, ], category: "product_name", name: "Communications Unified Assurance", }, { branches: [ { category: "product_version_range", name: "vers:unknown/24.3.0", product: { name: "vers:unknown/24.3.0", product_id: "CSAFPID-2698333", }, }, ], category: "product_name", name: "Management Cloud Engine", }, { branches: [ { category: "product_version_range", name: "vers:unknown/24.2.0", product: { name: "vers:unknown/24.2.0", product_id: "CSAFPID-2698334", }, }, ], category: "product_name", name: "Communications Cloud Native Core Network Data Analytics Function", }, { branches: [ { category: "product_version_range", name: "vers:unknown/24.2.5", product: { name: "vers:unknown/24.2.5", product_id: "CSAFPID-2698374", }, }, ], category: "product_name", name: "Communications Cloud Native Core Network Function Cloud Native Environment", }, { branches: [ { category: "product_version_range", name: "vers:unknown/9.0.0", product: { name: "vers:unknown/9.0.0", product_id: "CSAFPID-1234193", }, }, { category: "product_version_range", name: "vers:unknown/9.0.1", product: { name: "vers:unknown/9.0.1", product_id: "CSAFPID-1234261", }, }, { category: "product_version_range", name: "vers:unknown/9.0.2", product: { name: "vers:unknown/9.0.2", product_id: "CSAFPID-2698362", }, }, { category: "product_version_range", name: "vers:unknown/9.0.3", product: { name: "vers:unknown/9.0.3", product_id: "CSAFPID-2698358", }, }, { category: "product_version_range", name: "vers:unknown/>=9.0.0|<=9.0.3", product: { name: "vers:unknown/>=9.0.0|<=9.0.3", product_id: "CSAFPID-2698372", }, }, ], category: "product_name", name: "Communications Element Manager", }, { branches: [ { category: "product_version_range", name: "vers:unknown/15.0.0.0.0", product: { name: "vers:unknown/15.0.0.0.0", product_id: "CSAFPID-1837923", }, }, ], category: "product_name", name: "Communications Policy Management", }, { branches: [ { category: "product_version_range", name: "vers:unknown/>=9.0.0|<=9.0.3", product: { name: "vers:unknown/>=9.0.0|<=9.0.3", product_id: "CSAFPID-2698373", }, }, ], category: "product_name", name: "Communications Session Report Manager", }, { branches: [ { category: "product_version_range", name: "vers:unknown/9.1.1.9", product: { name: "vers:unknown/9.1.1.9", product_id: "CSAFPID-2698357", }, }, ], category: "product_name", name: "SD-WAN Edge", }, { branches: [ { category: "product_version_range", name: "vers:unknown/24.2.3", product: { name: "vers:unknown/24.2.3", product_id: "CSAFPID-1838579", }, }, { category: "product_version_range", name: "vers:unknown/24.3.0", product: { name: "vers:unknown/24.3.0", product_id: "CSAFPID-1838582", }, }, ], category: "product_name", name: "Communications Cloud Native Core Unified Data Repository", }, { branches: [ { category: "product_version_range", name: "vers:unknown/10.0.0", product: { name: "vers:unknown/10.0.0", product_id: "CSAFPID-2698381", }, }, { category: "product_version_range", name: "vers:unknown/9.2.0", product: { name: "vers:unknown/9.2.0", product_id: "CSAFPID-1207518", }, }, { category: "product_version_range", name: "vers:unknown/9.3.0", product: { name: "vers:unknown/9.3.0", product_id: "CSAFPID-1207704", }, }, ], category: "product_name", name: "Communications Session Border Controller", }, { branches: [ { category: "product_version_range", name: "vers:unknown/4.1.0", product: { name: "vers:unknown/4.1.0", product_id: "CSAFPID-1207607", }, }, { category: "product_version_range", name: "vers:unknown/4.2.0", product: { name: "vers:unknown/4.2.0", product_id: "CSAFPID-1207752", }, }, ], category: "product_name", name: "Enterprise Communications Broker", }, ], category: "product_family", name: "Oracle", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1839911", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.1", product: { name: "vers:oracle/24.2.1", product_id: "CSAFPID-1839908", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=24.2.0|<=24.2.2", product: { name: "vers:oracle/>=24.2.0|<=24.2.2", product_id: "CSAFPID-2698963", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Binding Support Function", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.3", product: { name: "vers:oracle/24.2.3", product_id: "CSAFPID-2698973", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.4", product: { name: "vers:oracle/24.2.4", product_id: "CSAFPID-2699085", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.3.0", product: { name: "vers:oracle/24.3.0", product_id: "CSAFPID-1839941", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core DBTier", }, { branches: [ { category: "product_version_range", name: "vers:oracle/>=24.2.0|<=24.2.2", product: { name: "vers:oracle/>=24.2.0|<=24.2.2", product_id: "CSAFPID-1839907", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=24.2.0|<=24.2.4", product: { name: "vers:oracle/>=24.2.0|<=24.2.4", product_id: "CSAFPID-2698965", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=24.2.1|<=24.2.4", product: { name: "vers:oracle/>=24.2.1|<=24.2.4", product_id: "CSAFPID-2698944", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Policy", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.1", product: { name: "vers:oracle/24.2.1", product_id: "CSAFPID-1839952", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.2", product: { name: "vers:oracle/24.2.2", product_id: "CSAFPID-2699038", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Certificate Management", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.1", product: { name: "vers:oracle/24.2.1", product_id: "CSAFPID-1839951", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.2", product: { name: "vers:oracle/24.2.2", product_id: "CSAFPID-2699059", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Console", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.2", product: { name: "vers:oracle/24.2.2", product_id: "CSAFPID-1839919", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.3", product: { name: "vers:oracle/24.2.3", product_id: "CSAFPID-2698957", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Network Repository Function", }, { branches: [ { category: "product_version_range", name: "vers:oracle/23.4.0", product: { name: "vers:oracle/23.4.0", product_id: "CSAFPID-1839924", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1839910", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.1", product: { name: "vers:oracle/24.2.1", product_id: "CSAFPID-1839909", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.2", product: { name: "vers:oracle/24.2.2", product_id: "CSAFPID-1839894", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.3", product: { name: "vers:oracle/24.2.3", product_id: "CSAFPID-2698958", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.3.0", product: { name: "vers:oracle/24.3.0", product_id: "CSAFPID-2699094", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Security Edge Protection Proxy", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1839934", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.3", product: { name: "vers:oracle/24.2.3", product_id: "CSAFPID-2699086", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.3.0", product: { name: "vers:oracle/24.3.0", product_id: "CSAFPID-1839935", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/25.1.100", product: { name: "vers:oracle/25.1.100", product_id: "CSAFPID-2699073", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Service Communication Proxy", }, { branches: [ { category: "product_version_range", name: "vers:oracle/46.6", product: { name: "vers:oracle/46.6", product_id: "CSAFPID-2698993", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications EAGLE Element Management System", }, { branches: [ { category: "product_version_range", name: "vers:oracle/5.1", product: { name: "vers:oracle/5.1", product_id: "CSAFPID-1839893", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/5.2", product: { name: "vers:oracle/5.2", product_id: "CSAFPID-1839895", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Operations Monitor", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.11", product: { name: "vers:oracle/12.11", product_id: "CSAFPID-1839890", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.0", product: { name: "vers:oracle/14.0", product_id: "CSAFPID-1839891", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/14.0.0", product: { name: "vers:oracle/14.0.0", product_id: "CSAFPID-2699072", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0", product: { name: "vers:oracle/15.0", product_id: "CSAFPID-1839961", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.0", product: { name: "vers:oracle/15.0.0", product_id: "CSAFPID-2699023", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.1", product: { name: "vers:oracle/15.0.1", product_id: "CSAFPID-2699025", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.2", product: { name: "vers:oracle/15.0.2", product_id: "CSAFPID-2699024", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications User Data Repository", }, { branches: [ { category: "product_version_range", name: "vers:oracle/9.0.0.0", product: { name: "vers:oracle/9.0.0.0", product_id: "CSAFPID-2698999", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Diameter Signaling Router", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.3.0", product: { name: "vers:oracle/24.3.0", product_id: "CSAFPID-2698996", product_identification_helper: { cpe: "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Management Cloud Engine", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-2699007", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Network Data Analytics Function", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1839868", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.5", product: { name: "vers:oracle/24.2.5", product_id: "CSAFPID-2699029", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.3.0", product: { name: "vers:oracle/24.3.0", product_id: "CSAFPID-1839869", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Network Function Cloud Native Environment", }, { branches: [ { category: "product_version_range", name: "vers:oracle/9.0.0", product: { name: "vers:oracle/9.0.0", product_id: "CSAFPID-2699013", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.0.1", product: { name: "vers:oracle/9.0.1", product_id: "CSAFPID-2699012", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.0.2", product: { name: "vers:oracle/9.0.2", product_id: "CSAFPID-2699016", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.0.3", product: { name: "vers:oracle/9.0.3", product_id: "CSAFPID-2699015", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=9.0.0|<=9.0.3", product: { name: "vers:oracle/>=9.0.0|<=9.0.3", product_id: "CSAFPID-2699098", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Element Manager", }, { branches: [ { category: "product_version_range", name: "vers:oracle/15.0.0.0.0", product: { name: "vers:oracle/15.0.0.0.0", product_id: "CSAFPID-1839960", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Policy Management", }, { branches: [ { category: "product_version_range", name: "vers:oracle/9.0.0", product: { name: "vers:oracle/9.0.0", product_id: "CSAFPID-2699093", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.0.1", product: { name: "vers:oracle/9.0.1", product_id: "CSAFPID-2699092", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.0.2", product: { name: "vers:oracle/9.0.2", product_id: "CSAFPID-2699091", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.0.3", product: { name: "vers:oracle/9.0.3", product_id: "CSAFPID-2699090", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=9.0.0|<=9.0.3", product: { name: "vers:oracle/>=9.0.0|<=9.0.3", product_id: "CSAFPID-2699124", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Session Report Manager", }, { branches: [ { category: "product_version_range", name: "vers:oracle/9.1.1.9", product: { name: "vers:oracle/9.1.1.9", product_id: "CSAFPID-2698959", product_identification_helper: { cpe: "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle SD-WAN Edge", }, { branches: [ { category: "product_version_range", name: "vers:oracle/22.4.0", product: { name: "vers:oracle/22.4.0", product_id: "CSAFPID-2699181", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/23.4.4", product: { name: "vers:oracle/23.4.4", product_id: "CSAFPID-1839930", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.1.1", product: { name: "vers:oracle/24.1.1", product_id: "CSAFPID-1839933", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.2", product: { name: "vers:oracle/24.2.2", product_id: "CSAFPID-1839931", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.3", product: { name: "vers:oracle/24.2.3", product_id: "CSAFPID-1839963", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.3.0", product: { name: "vers:oracle/24.3.0", product_id: "CSAFPID-1839932", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/25.1.100", product: { name: "vers:oracle/25.1.100", product_id: "CSAFPID-2698956", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=23.1.0|<=23.4.0", product: { name: "vers:oracle/>=23.1.0|<=23.4.0", product_id: "CSAFPID-2699180", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Unified Data Repository", }, { branches: [ { category: "product_version_range", name: "vers:oracle/10.0.0", product: { name: "vers:oracle/10.0.0", product_id: "CSAFPID-2699083", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.2.0", product: { name: "vers:oracle/9.2.0", product_id: "CSAFPID-1839887", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/9.3.0", product: { name: "vers:oracle/9.3.0", product_id: "CSAFPID-1839889", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Session Border Controller", }, { branches: [ { category: "product_version_range", name: "vers:oracle/4.1.0", product: { name: "vers:oracle/4.1.0", product_id: "CSAFPID-1839888", product_identification_helper: { cpe: "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/4.2.0", product: { name: "vers:oracle/4.2.0", product_id: "CSAFPID-1839886", product_identification_helper: { cpe: "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Enterprise Communications Broker", }, { branches: [ { category: "product_version_range", name: "vers:oracle/24.1.0", product: { name: "vers:oracle/24.1.0", product_id: "CSAFPID-1839925", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1840027", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.3.0", product: { name: "vers:oracle/24.3.0", product_id: "CSAFPID-2699041", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=24.1.0|<=24.3.0", product: { name: "vers:oracle/>=24.1.0|<=24.3.0", product_id: "CSAFPID-2698961", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Network Analytics Data Director", }, ], category: "product_family", name: "Oracle Communications", }, { branches: [ { category: "product_version_range", name: "vers:oracle/>=23.4.0|<=23.4.1", product: { name: "vers:oracle/>=23.4.0|<=23.4.1", product_id: "CSAFPID-1145869", }, }, { category: "product_version_range", name: "vers:oracle/>=23.4.0|<=23.4.3", product: { name: "vers:oracle/>=23.4.0|<=23.4.3", product_id: "CSAFPID-1145271", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=23.4.0|<=23.4.5", product: { name: "vers:oracle/>=23.4.0|<=23.4.5", product_id: "CSAFPID-1173947", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Binding Support Function", }, { branches: [ { category: "product_version_range", name: "vers:oracle/>=23.4.0|<=23.4.2", product: { name: "vers:oracle/>=23.4.0|<=23.4.2", product_id: "CSAFPID-1145868", }, }, { category: "product_version_range", name: "vers:oracle/>=23.4.0|<=23.4.4", product: { name: "vers:oracle/>=23.4.0|<=23.4.4", product_id: "CSAFPID-1145270", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=23.4.0|<=23.4.6", product: { name: "vers:oracle/>=23.4.0|<=23.4.6", product_id: "CSAFPID-1173946", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Policy", }, { branches: [ { category: "product_version_range", name: "vers:oracle/23.4.3", product: { name: "vers:oracle/23.4.3", product_id: "CSAFPID-1173942", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1173945", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Certificate Management", }, { branches: [ { category: "product_version_range", name: "vers:oracle/23.4.2", product: { name: "vers:oracle/23.4.2", product_id: "CSAFPID-1173940", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1173941", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Console", }, { branches: [ { category: "product_version_range", name: "vers:oracle/23.4.4", product: { name: "vers:oracle/23.4.4", product_id: "CSAFPID-1173965", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.1", product: { name: "vers:oracle/24.2.1", product_id: "CSAFPID-1173967", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Network Repository Function", }, { branches: [ { category: "product_version_range", name: "vers:oracle/23.4.2", product: { name: "vers:oracle/23.4.2", product_id: "CSAFPID-1173943", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1173944", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Security Edge Protection Proxy", }, { branches: [ { category: "product_version_range", name: "vers:oracle/23.4.0", product: { name: "vers:oracle/23.4.0", product_id: "CSAFPID-1145265", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.1.0", product: { name: "vers:oracle/24.1.0", product_id: "CSAFPID-1145273", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.2.0", product: { name: "vers:oracle/24.2.0", product_id: "CSAFPID-1174046", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Service Communication Proxy", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:oracle/7.3.6", product: { name: "vers:oracle/7.3.6", product_id: "CSAFPID-2699077", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.4.0", product: { name: "vers:oracle/7.4.0", product_id: "CSAFPID-2699075", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.5.0", product: { name: "vers:oracle/7.5.0", product_id: "CSAFPID-2699076", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Network Integrity", }, { branches: [ { category: "product_version_range", name: "vers:oracle/6.0", product: { name: "vers:oracle/6.0", product_id: "CSAFPID-2699027", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=6.0.0|<=6.0.5", product: { name: "vers:oracle/>=6.0.0|<=6.0.5", product_id: "CSAFPID-1839852", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=6.0.4|<=6.0.5", product: { name: "vers:oracle/>=6.0.4|<=6.0.5", product_id: "CSAFPID-1840033", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=6.0|<=6.1", product: { name: "vers:oracle/>=6.0|<=6.1", product_id: "CSAFPID-2698955", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Unified Assurance", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.0.0.8.0", product: { name: "vers:oracle/12.0.0.8.0", product_id: "CSAFPID-2699001", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.0.0.0", product: { name: "vers:oracle/15.0.0.0.0", product_id: "CSAFPID-2699084", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.1.0.0", product: { name: "vers:oracle/15.0.1.0.0", product_id: "CSAFPID-2699079", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=12.0.0.4.0|<=12.0.0.8.0", product: { name: "vers:oracle/>=12.0.0.4.0|<=12.0.0.8.0", product_id: "CSAFPID-2699058", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=12.0.0.4|<=12.0.0.8", product: { name: "vers:oracle/>=12.0.0.4|<=12.0.0.8", product_id: "CSAFPID-1839957", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=15.0.0.0.0|<=15.0.1.0.0", product: { name: "vers:oracle/>=15.0.0.0.0|<=15.0.1.0.0", product_id: "CSAFPID-2699000", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=15.0.0.0|<=15.0.0.1", product: { name: "vers:oracle/>=15.0.0.0|<=15.0.0.1", product_id: "CSAFPID-1839953", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Billing and Revenue Management", }, { branches: [ { category: "product_version_range", name: "vers:oracle/8.1.0.26.0", product: { name: "vers:oracle/8.1.0.26.0", product_id: "CSAFPID-2698964", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Messaging Server", }, { branches: [ { category: "product_version_range", name: "vers:oracle/6.3.1", product: { name: "vers:oracle/6.3.1", product_id: "CSAFPID-2698991", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications MetaSolv Solution", }, { branches: [ { category: "product_version_range", name: "vers:oracle/12.0.6.0.0", product: { name: "vers:oracle/12.0.6.0.0", product_id: "CSAFPID-2699127", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.0.0.0", product: { name: "vers:oracle/15.0.0.0.0", product_id: "CSAFPID-2699126", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.1.0.0", product: { name: "vers:oracle/15.0.1.0.0", product_id: "CSAFPID-2699128", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Network Charging and Control", }, { branches: [ { category: "product_version_range", name: "vers:oracle/7.4.0", product: { name: "vers:oracle/7.4.0", product_id: "CSAFPID-1839980", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.5.0", product: { name: "vers:oracle/7.5.0", product_id: "CSAFPID-1840004", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.4.1", product: { name: "vers:oracle/7.4.1", product_id: "CSAFPID-1839981", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Order and Service Management", }, { branches: [ { category: "product_version_range", name: "vers:oracle/15.0.0.0.0", product: { name: "vers:oracle/15.0.0.0.0", product_id: "CSAFPID-2699056", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/15.0.1.0.0", product: { name: "vers:oracle/15.0.1.0.0", product_id: "CSAFPID-2699063", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=12.0.0.4.0|<=12.0.0.8.0", product: { name: "vers:oracle/>=12.0.0.4.0|<=12.0.0.8.0", product_id: "CSAFPID-2699060", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Pricing Design Center", }, { branches: [ { category: "product_version_range", name: "vers:oracle/8.0.0.3", product: { name: "vers:oracle/8.0.0.3", product_id: "CSAFPID-1839921", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.0.0.4.0", product: { name: "vers:oracle/8.0.0.4.0", product_id: "CSAFPID-2698975", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.0.1", product: { name: "vers:oracle/8.1.0.1", product_id: "CSAFPID-1839922", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/8.1.0.2.0", product: { name: "vers:oracle/8.1.0.2.0", product_id: "CSAFPID-2698974", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Service Catalog and Design", }, { branches: [ { category: "product_version_range", name: "vers:oracle/7.4.1", product: { name: "vers:oracle/7.4.1", product_id: "CSAFPID-1839978", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.4.2", product: { name: "vers:oracle/7.4.2", product_id: "CSAFPID-1839979", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.5.0", product: { name: "vers:oracle/7.5.0", product_id: "CSAFPID-2699035", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.5.1", product: { name: "vers:oracle/7.5.1", product_id: "CSAFPID-1839983", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.6.0", product: { name: "vers:oracle/7.6.0", product_id: "CSAFPID-1840005", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/7.7.0", product: { name: "vers:oracle/7.7.0", product_id: "CSAFPID-2699034", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=7.4.0|<=7.4.2", product: { name: "vers:oracle/>=7.4.0|<=7.4.2", product_id: "CSAFPID-2699036", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/>=7.5.0|<=7.5.1", product: { name: "vers:oracle/>=7.5.0|<=7.5.1", product_id: "CSAFPID-2699096", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Unified Inventory Management", }, ], category: "product_family", name: "Oracle Communications Applications", }, { branches: [ { category: "product_version_range", name: "vers:oracle/23.4.0", product: { name: "vers:oracle/23.4.0", product_id: "CSAFPID-1145246", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_version_range", name: "vers:oracle/24.1.0", product: { name: "vers:oracle/24.1.0", product_id: "CSAFPID-1145247", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*", }, }, }, ], category: "product_name", name: "Oracle Communications Cloud Native Core Network Function Cloud Native Environment", }, ], category: "vendor", name: "Oracle", }, { branches: [ { branches: [ { category: "product_version_range", name: "vers:semver/7.4.0", product: { name: "vers:semver/7.4.0", product_id: "CSAFPID-2698653", }, }, { category: "product_version_range", name: "vers:semver/7.4.1", product: { name: "vers:semver/7.4.1", product_id: "CSAFPID-2698654", }, }, { category: "product_version_range", name: "vers:semver/7.5.0", product: { name: "vers:semver/7.5.0", product_id: "CSAFPID-2698655", }, }, ], category: "product_name", name: "Oracle Communications Order and Service Management", }, ], category: "vendor", name: "Oracle Corporation", }, ], }, vulnerabilities: [ { cve: "CVE-2023-5388", cwe: { id: "CWE-208", name: "Observable Timing Discrepancy", }, notes: [ { category: "other", text: "Observable Timing Discrepancy", title: "CWE-208", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2023-5388", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2023-5388", }, { cve: "CVE-2023-5685", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2023-5685", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2023-5685", }, { cve: "CVE-2023-49582", cwe: { id: "CWE-732", name: "Incorrect Permission Assignment for Critical Resource", }, notes: [ { category: "other", text: "Incorrect Permission Assignment for Critical Resource", title: "CWE-732", }, { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2023-49582", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2023-49582", }, { cve: "CVE-2023-51074", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2023-51074", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2023-51074", }, { cve: "CVE-2024-1135", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, notes: [ { category: "other", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", title: "CWE-444", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-1135", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json", }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-1135", }, { cve: "CVE-2024-4227", cwe: { id: "CWE-834", name: "Excessive Iteration", }, notes: [ { category: "other", text: "Excessive Iteration", title: "CWE-834", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-4227", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-4227", }, { cve: "CVE-2024-5535", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "other", text: "Dependency on Vulnerable Third-Party Component", title: "CWE-1395", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-5535", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-5535", }, { cve: "CVE-2024-6763", cwe: { id: "CWE-1286", name: "Improper Validation of Syntactic Correctness of Input", }, notes: [ { category: "other", text: "Improper Validation of Syntactic Correctness of Input", title: "CWE-1286", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-6763", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json", }, ], title: "CVE-2024-6763", }, { cve: "CVE-2024-7254", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-7254", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json", }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-7254", }, { cve: "CVE-2024-11053", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-11053", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-11053", }, { cve: "CVE-2024-12797", cwe: { id: "CWE-392", name: "Missing Report of Error Condition", }, notes: [ { category: "other", text: "Missing Report of Error Condition", title: "CWE-392", }, { category: "other", text: "Dependency on Vulnerable Third-Party Component", title: "CWE-1395", }, { category: "other", text: "Improper Certificate Validation", title: "CWE-295", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-12797", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-12797", }, { cve: "CVE-2024-12798", cwe: { id: "CWE-917", name: "Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')", }, notes: [ { category: "other", text: "Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')", title: "CWE-917", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-12798", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json", }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-12798", }, { cve: "CVE-2024-21538", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-21538", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-21538", }, { cve: "CVE-2024-25638", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "other", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "other", text: "Acceptance of Extraneous Untrusted Data With Trusted Data", title: "CWE-349", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-25638", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json", }, ], scores: [ { cvss_v3: { baseScore: 8.9, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-25638", }, { cve: "CVE-2024-28168", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-28168", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-28168", }, { cve: "CVE-2024-28219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "other", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "other", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "other", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-28219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-28219", }, { cve: "CVE-2024-28834", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-28834", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-28834", }, { cve: "CVE-2024-31141", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Files or Directories Accessible to External Parties", title: "CWE-552", }, { category: "other", text: "Improper Privilege Management", title: "CWE-269", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-31141", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-31141", }, { cve: "CVE-2024-34064", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-34064", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json", }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-34064", }, { cve: "CVE-2024-35195", cwe: { id: "CWE-670", name: "Always-Incorrect Control Flow Implementation", }, notes: [ { category: "other", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-35195", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json", }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-35195", }, { cve: "CVE-2024-37891", cwe: { id: "CWE-669", name: "Incorrect Resource Transfer Between Spheres", }, notes: [ { category: "other", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-37891", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-37891", }, { cve: "CVE-2024-38819", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-38819", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-38819", }, { cve: "CVE-2024-38827", cwe: { id: "CWE-639", name: "Authorization Bypass Through User-Controlled Key", }, notes: [ { category: "other", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-38827", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json", }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-38827", }, { cve: "CVE-2024-40896", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-40896", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-40896", }, { cve: "CVE-2024-43044", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "other", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-43044", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json", }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-43044", }, { cve: "CVE-2024-43709", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-43709", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json", }, ], title: "CVE-2024-43709", }, { cve: "CVE-2024-43796", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, { category: "general", text: "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-43796", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json", }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-43796", }, { cve: "CVE-2024-47072", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-47072", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-47072", }, { cve: "CVE-2024-47554", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-47554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-47554", }, { cve: "CVE-2024-49767", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-49767", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-49767", }, { cve: "CVE-2024-50602", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "general", text: "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-50602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-50602", }, { cve: "CVE-2024-52046", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-52046", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-52046", }, { cve: "CVE-2024-52303", cwe: { id: "CWE-772", name: "Missing Release of Resource after Effective Lifetime", }, notes: [ { category: "other", text: "Missing Release of Resource after Effective Lifetime", title: "CWE-772", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-52303", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-52303", }, { cve: "CVE-2024-53122", cwe: { id: "CWE-362", name: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", }, notes: [ { category: "other", text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", title: "CWE-362", }, { category: "other", text: "Divide By Zero", title: "CWE-369", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-53122", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-53122", }, { cve: "CVE-2024-56128", cwe: { id: "CWE-303", name: "Incorrect Implementation of Authentication Algorithm", }, notes: [ { category: "other", text: "Incorrect Implementation of Authentication Algorithm", title: "CWE-303", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-56128", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-56128", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2024-57699", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2024-57699", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2024-57699", }, { cve: "CVE-2025-1974", cwe: { id: "CWE-653", name: "Improper Isolation or Compartmentalization", }, notes: [ { category: "other", text: "Improper Isolation or Compartmentalization", title: "CWE-653", }, { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-1974", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-1974", }, { cve: "CVE-2025-23084", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-23084", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json", }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-23084", }, { cve: "CVE-2025-23184", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-23184", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json", }, ], title: "CVE-2025-23184", }, { cve: "CVE-2025-24813", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "other", text: "Path Equivalence: 'file.name' (Internal Dot)", title: "CWE-44", }, { category: "other", text: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", title: "CWE-444", }, { category: "other", text: "Use of Incorrectly-Resolved Name or Reference", title: "CWE-706", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-24813", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-24813", }, { cve: "CVE-2025-24928", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, notes: [ { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-24928", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-24928", }, { cve: "CVE-2025-24970", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-24970", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-24970", }, { cve: "CVE-2025-27516", cwe: { id: "CWE-1336", name: "Improper Neutralization of Special Elements Used in a Template Engine", }, notes: [ { category: "other", text: "Improper Neutralization of Special Elements Used in a Template Engine", title: "CWE-1336", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-27516", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json", }, ], title: "CVE-2025-27516", }, { cve: "CVE-2025-27789", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-27789", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json", }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-27789", }, { cve: "CVE-2025-30729", product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-30729", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-30729", }, { cve: "CVE-2025-31721", cwe: { id: "CWE-862", name: "Missing Authorization", }, notes: [ { category: "other", text: "Missing Authorization", title: "CWE-862", }, ], product_status: { known_affected: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, references: [ { category: "self", summary: "CVE-2025-31721", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json", }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586", ], }, ], title: "CVE-2025-31721", }, ], }
opensuse-su-2025:14897-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "tomcat10-10.1.35-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the tomcat10-10.1.35-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2025-14897", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14897-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2025:14897-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2025:14897-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/", }, { category: "self", summary: "SUSE CVE CVE-2004-56337 page", url: "https://www.suse.com/security/cve/CVE-2004-56337/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "tomcat10-10.1.35-1.1 on GA media", tracking: { current_release_date: "2025-03-15T00:00:00Z", generator: { date: "2025-03-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2025:14897-1", initial_release_date: "2025-03-15T00:00:00Z", revision_history: [ { date: "2025-03-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.aarch64", product: { name: "tomcat10-10.1.35-1.1.aarch64", product_id: "tomcat10-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", product_id: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.aarch64", product: { name: "tomcat10-doc-10.1.35-1.1.aarch64", product_id: "tomcat10-doc-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", product_id: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.aarch64", product: { name: "tomcat10-embed-10.1.35-1.1.aarch64", product_id: "tomcat10-embed-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.aarch64", product: { name: "tomcat10-jsvc-10.1.35-1.1.aarch64", product_id: "tomcat10-jsvc-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.aarch64", product: { name: "tomcat10-lib-10.1.35-1.1.aarch64", product_id: "tomcat10-lib-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.aarch64", product: { name: "tomcat10-webapps-10.1.35-1.1.aarch64", product_id: "tomcat10-webapps-10.1.35-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.ppc64le", product: { name: "tomcat10-10.1.35-1.1.ppc64le", product_id: "tomcat10-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", product_id: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.ppc64le", product: { name: "tomcat10-doc-10.1.35-1.1.ppc64le", product_id: "tomcat10-doc-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", product_id: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.ppc64le", product: { name: "tomcat10-embed-10.1.35-1.1.ppc64le", product_id: "tomcat10-embed-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.ppc64le", product: { name: "tomcat10-jsvc-10.1.35-1.1.ppc64le", product_id: "tomcat10-jsvc-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.ppc64le", product: { name: "tomcat10-lib-10.1.35-1.1.ppc64le", product_id: "tomcat10-lib-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.ppc64le", product: { name: "tomcat10-webapps-10.1.35-1.1.ppc64le", product_id: "tomcat10-webapps-10.1.35-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.s390x", product: { name: "tomcat10-10.1.35-1.1.s390x", product_id: "tomcat10-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.s390x", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.s390x", product_id: "tomcat10-admin-webapps-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.s390x", product: { name: "tomcat10-doc-10.1.35-1.1.s390x", product_id: "tomcat10-doc-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.s390x", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.s390x", product_id: "tomcat10-docs-webapp-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.s390x", product: { name: "tomcat10-embed-10.1.35-1.1.s390x", product_id: "tomcat10-embed-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.s390x", product: { name: "tomcat10-jsvc-10.1.35-1.1.s390x", product_id: "tomcat10-jsvc-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.s390x", product: { name: "tomcat10-lib-10.1.35-1.1.s390x", product_id: "tomcat10-lib-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.s390x", product: { name: "tomcat10-webapps-10.1.35-1.1.s390x", product_id: "tomcat10-webapps-10.1.35-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.x86_64", product: { name: "tomcat10-10.1.35-1.1.x86_64", product_id: "tomcat10-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", product_id: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.x86_64", product: { name: "tomcat10-doc-10.1.35-1.1.x86_64", product_id: "tomcat10-doc-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", product_id: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.x86_64", product: { name: "tomcat10-embed-10.1.35-1.1.x86_64", product_id: "tomcat10-embed-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.x86_64", product: { name: "tomcat10-jsvc-10.1.35-1.1.x86_64", product_id: "tomcat10-jsvc-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.x86_64", product: { name: "tomcat10-lib-10.1.35-1.1.x86_64", product_id: "tomcat10-lib-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.x86_64", product: { name: "tomcat10-webapps-10.1.35-1.1.x86_64", product_id: "tomcat10-webapps-10.1.35-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", }, product_reference: "tomcat10-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-doc-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-doc-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", }, product_reference: "tomcat10-doc-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-doc-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-embed-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-embed-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", }, product_reference: "tomcat10-embed-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-embed-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-lib-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-lib-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", }, product_reference: "tomcat10-lib-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-lib-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-webapps-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-webapps-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", }, product_reference: "tomcat10-webapps-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-webapps-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2004-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], notes: [ { category: "general", text: "unknown", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2004-56337", url: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2004-56337", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
opensuse-su-2025:14896-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "tomcat-9.0.99-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the tomcat-9.0.99-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2025-14896", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14896-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2025:14896-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2025:14896-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/", }, { category: "self", summary: "SUSE CVE CVE-2004-56337 page", url: "https://www.suse.com/security/cve/CVE-2004-56337/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "tomcat-9.0.99-1.1 on GA media", tracking: { current_release_date: "2025-03-15T00:00:00Z", generator: { date: "2025-03-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2025:14896-1", initial_release_date: "2025-03-15T00:00:00Z", revision_history: [ { date: "2025-03-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.aarch64", product: { name: "tomcat-9.0.99-1.1.aarch64", product_id: "tomcat-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.aarch64", product: { name: "tomcat-admin-webapps-9.0.99-1.1.aarch64", product_id: "tomcat-admin-webapps-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.aarch64", product: { name: "tomcat-docs-webapp-9.0.99-1.1.aarch64", product_id: "tomcat-docs-webapp-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", product_id: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.aarch64", product: { name: "tomcat-embed-9.0.99-1.1.aarch64", product_id: "tomcat-embed-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.aarch64", product: { name: "tomcat-javadoc-9.0.99-1.1.aarch64", product_id: "tomcat-javadoc-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.aarch64", product: { name: "tomcat-jsvc-9.0.99-1.1.aarch64", product_id: "tomcat-jsvc-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.aarch64", product: { name: "tomcat-lib-9.0.99-1.1.aarch64", product_id: "tomcat-lib-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.aarch64", product: { name: "tomcat-webapps-9.0.99-1.1.aarch64", product_id: "tomcat-webapps-9.0.99-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.ppc64le", product: { name: "tomcat-9.0.99-1.1.ppc64le", product_id: "tomcat-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", product: { name: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", product_id: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", product: { name: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", product_id: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", product_id: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.ppc64le", product: { name: "tomcat-embed-9.0.99-1.1.ppc64le", product_id: "tomcat-embed-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.ppc64le", product: { name: "tomcat-javadoc-9.0.99-1.1.ppc64le", product_id: "tomcat-javadoc-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.ppc64le", product: { name: "tomcat-jsvc-9.0.99-1.1.ppc64le", product_id: "tomcat-jsvc-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.ppc64le", product: { name: "tomcat-lib-9.0.99-1.1.ppc64le", product_id: "tomcat-lib-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.ppc64le", product: { name: "tomcat-webapps-9.0.99-1.1.ppc64le", product_id: "tomcat-webapps-9.0.99-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.s390x", product: { name: "tomcat-9.0.99-1.1.s390x", product_id: "tomcat-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.s390x", product: { name: "tomcat-admin-webapps-9.0.99-1.1.s390x", product_id: "tomcat-admin-webapps-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.s390x", product: { name: "tomcat-docs-webapp-9.0.99-1.1.s390x", product_id: "tomcat-docs-webapp-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.s390x", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.s390x", product_id: "tomcat-el-3_0-api-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.s390x", product: { name: "tomcat-embed-9.0.99-1.1.s390x", product_id: "tomcat-embed-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.s390x", product: { name: "tomcat-javadoc-9.0.99-1.1.s390x", product_id: "tomcat-javadoc-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.s390x", product: { name: "tomcat-jsvc-9.0.99-1.1.s390x", product_id: "tomcat-jsvc-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.s390x", product: { name: "tomcat-lib-9.0.99-1.1.s390x", product_id: "tomcat-lib-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.s390x", product: { name: "tomcat-webapps-9.0.99-1.1.s390x", product_id: "tomcat-webapps-9.0.99-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.x86_64", product: { name: "tomcat-9.0.99-1.1.x86_64", product_id: "tomcat-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.x86_64", product: { name: "tomcat-admin-webapps-9.0.99-1.1.x86_64", product_id: "tomcat-admin-webapps-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.x86_64", product: { name: "tomcat-docs-webapp-9.0.99-1.1.x86_64", product_id: "tomcat-docs-webapp-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", product_id: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.x86_64", product: { name: "tomcat-embed-9.0.99-1.1.x86_64", product_id: "tomcat-embed-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.x86_64", product: { name: "tomcat-javadoc-9.0.99-1.1.x86_64", product_id: "tomcat-javadoc-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.x86_64", product: { name: "tomcat-jsvc-9.0.99-1.1.x86_64", product_id: "tomcat-jsvc-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.x86_64", product: { name: "tomcat-lib-9.0.99-1.1.x86_64", product_id: "tomcat-lib-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.x86_64", product: { name: "tomcat-webapps-9.0.99-1.1.x86_64", product_id: "tomcat-webapps-9.0.99-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", }, product_reference: "tomcat-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", }, product_reference: "tomcat-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", }, product_reference: "tomcat-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", }, product_reference: "tomcat-embed-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-embed-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", }, product_reference: "tomcat-embed-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", }, product_reference: "tomcat-embed-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", }, product_reference: "tomcat-javadoc-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-javadoc-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", }, product_reference: "tomcat-javadoc-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", }, product_reference: "tomcat-javadoc-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", }, product_reference: "tomcat-jsvc-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-jsvc-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", }, product_reference: "tomcat-jsvc-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", }, product_reference: "tomcat-jsvc-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", }, product_reference: "tomcat-lib-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-lib-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", }, product_reference: "tomcat-lib-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", }, product_reference: "tomcat-lib-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", }, product_reference: "tomcat-webapps-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-webapps-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", }, product_reference: "tomcat-webapps-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", }, product_reference: "tomcat-webapps-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2004-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], notes: [ { category: "general", text: "unknown", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2004-56337", url: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2004-56337", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
wid-sec-w-2024-3744
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um beliebigen Programmcode auszuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- NetApp Appliance\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3744 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3744.json", }, { category: "self", summary: "WID-SEC-2024-3744 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3744", }, { category: "external", summary: "OSS Security Mailing List vom 2024-12-22", url: "https://seclists.org/oss-sec/2024/q4/164", }, { category: "external", summary: "Red Hat Bugzilla vom 2024-12-22", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2333521", }, { category: "external", summary: "GitHub Advisory Database vom 2024-12-22", url: "https://github.com/advisories/GHSA-27hp-xhwr-wr2m", }, { category: "external", summary: "NetApp Security Advisory NTAP-20250103-0002 vom 2025-01-03", url: "https://security.netapp.com/advisory/ntap-20250103-0002/", }, { category: "external", summary: "IBM Security Bulletin 7180700 vom 2025-01-10", url: "https://www.ibm.com/support/pages/node/7180700", }, { category: "external", summary: "Debian Security Advisory DLA-4017 vom 2025-01-17", url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html", }, { category: "external", summary: "Debian Security Advisory DSA-5845 vom 2025-01-17", url: "https://lists.debian.org/debian-security-announce/2025/msg00007.html", }, ], source_lang: "en-US", title: "Apache Tomcat: Schwachstelle ermöglicht Codeausführung", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:18:26.739+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-3744", initial_release_date: "2024-12-22T23:00:00.000+00:00", revision_history: [ { date: "2024-12-22T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-12-23T23:00:00.000+00:00", number: "2", summary: "Anpassung der Produkt-Versionen", }, { date: "2025-01-02T23:00:00.000+00:00", number: "3", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2025-01-12T23:00:00.000+00:00", number: "4", summary: "Neue Updates von IBM aufgenommen", }, { date: "2025-01-16T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Debian aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Debian aufgenommen", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<11.0.2", product: { name: "Apache Tomcat <11.0.2", product_id: "T039886", }, }, { category: "product_version", name: "11.0.2", product: { name: "Apache Tomcat 11.0.2", product_id: "T039886-fixed", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:11.0.2", }, }, }, { category: "product_version_range", name: "<10.1.34", product: { name: "Apache Tomcat <10.1.34", product_id: "T039887", }, }, { category: "product_version", name: "10.1.34", product: { name: "Apache Tomcat 10.1.34", product_id: "T039887-fixed", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:10.1.34", }, }, }, { category: "product_version_range", name: "<9.0.98", product: { name: "Apache Tomcat <9.0.98", product_id: "T039888", }, }, { category: "product_version", name: "9.0.98", product: { name: "Apache Tomcat 9.0.98", product_id: "T039888-fixed", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:9.0.98", }, }, }, ], category: "product_name", name: "Tomcat", }, ], category: "vendor", name: "Apache", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "IBM Integration Bus", product: { name: "IBM Integration Bus", product_id: "T039654", product_identification_helper: { cpe: "cpe:/a:ibm:integration_bus:for_zos", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { branches: [ { category: "product_version", name: "for Linux", product: { name: "NetApp ActiveIQ Unified Manager for Linux", product_id: "T023548", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:for_linux", }, }, }, { category: "product_version", name: "for VMware vSphere", product: { name: "NetApp ActiveIQ Unified Manager for VMware vSphere", product_id: "T025152", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere", }, }, }, { category: "product_version", name: "for Microsoft Windows", product: { name: "NetApp ActiveIQ Unified Manager for Microsoft Windows", product_id: "T025631", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows", }, }, }, ], category: "product_name", name: "ActiveIQ Unified Manager", }, ], category: "vendor", name: "NetApp", }, ], }, vulnerabilities: [ { cve: "CVE-2024-56337", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Apache Tomcat. Dieser Fehler existiert wegen einer Time-of-check Time-of-use (TOCTOU) Race Condition in der JSP-Kompilierung. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T023548", "T025152", "2951", "T025631", "T039887", "T039886", "T039888", "T039654", ], }, release_date: "2024-12-22T23:00:00.000+00:00", title: "CVE-2024-56337", }, ], }
suse-su-2025:0033-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat10", title: "Title of the patch", }, { category: "description", text: "This update for tomcat10 fixes the following issues:\n\nUpdate to Tomcat 10.1.34\n\n- Fixed CVEs:\n + CVE-2024-54677: DoS in examples web application (bsc#1234664)\n + CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663) \n + CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)\n + CVE-2024-56337: RCE due to TOCTOU issue in JSP compilation - mitigation was incomplete\n- Catalina\n + Add: Add option to serve resources from subpath only with WebDAV Servlet\n like with DefaultServlet. (michaelo)\n + Fix: Add special handling for the protocols attribute of SSLHostConfig in\n storeconfig. (remm)\n + Fix: 69442: Fix case sensitive check on content-type when parsing request\n parameters. (remm)\n + Code: Refactor duplicate code for extracting media type and subtype from\n content-type into a single method. (markt)\n + Fix: Compatibility of generated embedded code with components where\n constructors or property related methods throw a checked exception. (remm)\n + Fix: The previous fix for inconsistent resource metadata during concurrent\n reads and writes was incomplete. (markt)\n + Fix: #780: Fix content-range header length. Submitted by Chenjp. (remm)\n + Fix: 69444: Ensure that the jakarta.servlet.error.message request\n attribute is set when an application defined error page is called. (markt)\n + Fix: Avoid quotes for numeric values in the JSON generated by the status\n servlet. (remm)\n + Add: Add strong ETag support for the WebDAV and default servlet, which can\n be enabled by using the useStrongETags init parameter with a value set to\n true. The ETag generated will be a SHA-1 checksum of the resource content.\n (remm)\n + Fix: Use client locale for directory listings. (remm)\n + Fix: 69439: Improve the handling of multiple Cache-Control headers in the\n ExpiresFilter. Based on pull request #777 by Chenjp. (markt)\n + Fix: 69447: Update the support for caching classes the web application\n class loader cannot find to take account of classes loaded from external\n repositories. Prior to this fix, these classes could be incorrectly marked\n as not found. (markt)\n + Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by\n users will not be removed and any header present in a HEAD request will\n also be present in the equivalent GET request. There may be some headers,\n as per RFC 9110, section 9.3.2, that are present in a GET request that are\n not present in the equivalent HEAD request. (markt)\n + Fix: 69471: Log instances of CloseNowException caught by\n ApplicationDispatcher.invoke() at debug level rather than error level as\n they are very likely to have been caused by a client disconnection or\n similar I/O issue. (markt)\n + Add: Add a test case for the fix for 69442. Also refactor references to\n application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.\n (markt)\n + Fix: 69476: Catch possible ISE when trying to report PUT failure in the\n DefaultServlet. (remm)\n + Add: Add support for RateLimit header fields for HTTP (draft) in the\n RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)\n + Add: #787: Add regression tests for 69478. Pull request provided by Thomas\n Krisch. (markt)\n + Fix: The default servlet now rejects HTTP range requests when two or more\n of the requested ranges overlap. Based on pull request #782 provided by\n Chenjp. (markt)\n + Fix: Enhance Content-Range verification for partial PUT requests handled\n by the default servlet. Provided by Chenjp in pull request #778. (markt)\n + Fix: Harmonize DataSourceStore lookup in the global resources to\n optionally avoid the comp/env prefix which is usually not used there.\n (remm)\n + Fix: As required by RFC 9110, the HTTP Range header will now only be\n processed for GET requests. Based on pull request #790 provided by Chenjp.\n (markt)\n + Fix: Deprecate the useAcceptRanges initialisation parameter for the\n default servlet. It will be removed in Tomcat 12 onwards where it will\n effectively be hard coded to true. (markt)\n + Add: Add DataSource based property storage for the WebdavServlet. (remm)\n- Coyote\n + Fix: Align encodedSolidusHandling with the Servlet specification. If the\n pass-through mode is used, any %25 sequences will now also be passed\n through to avoid errors and/or corruption when the application decodes the\n path. (markt)\n- Jasper\n + Fix: Follow-up to the fix for 69381. Apply the optimisation for method\n lookup performance in expression language to an additional location.\n (markt)\n- Web applications\n + Fix: Documentation. Remove references to the ResourceParams element.\n Support for ResourceParams was removed in Tomcat 5.5.x. (markt)\n + Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter.\n The attribute is internalProxies rather than allowedInternalProxies. Pull\n request #786 (markt)\n + Fix: Examples. Fix broken links when Servlet Request Info example is\n called via a URL that includes a pathInfo component. (markt)\n + Fix: Examples. Expand the obfuscation of session cookie values in the\n request header example to JSON responses. (markt)\n + Add: Examples. Add the ability to delete session attributes in the servlet\n session example. (markt)\n + Add: Examples. Add a hard coded limit of 10 attributes per session for the\n servlet session example. (markt)\n + Add: Examples. Add the ability to delete session attributes and add a hard\n coded limit of 10 attributes per session for the JSP form authentication\n example. (markt)\n + Add: Examples. Limit the shopping cart example to only allow adding the\n pre-defined items to the cart. (markt)\n + Fix: Examples. Remove JSP calendar example. (markt)\n- Other\n + Fix: 69465: Fix warnings during native image compilation using the Tomcat\n embedded JARs. (markt)\n + Update: Update Tomcat's fork of Commons DBCP to 2.13.0. (markt)\n + Update: Update EasyMock to 5.5.0. (markt)\n + Update: Update Checkstyle to 10.20.2. (markt)\n + Update: Update BND to 7.1.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Korean translations. (markt)\n + Add: Improvements to Chinese translations. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt) \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-33,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-33,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-33,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-33,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-33,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-33,openSUSE-SLE-15.6-2025-33", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0033-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:0033-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20250033-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:0033-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020069.html", }, { category: "self", summary: "SUSE Bug 1233435", url: "https://bugzilla.suse.com/1233435", }, { category: "self", summary: "SUSE Bug 1234663", url: "https://bugzilla.suse.com/1234663", }, { category: "self", summary: "SUSE Bug 1234664", url: "https://bugzilla.suse.com/1234664", }, { category: "self", summary: "SUSE Bug 1236809", url: "https://bugzilla.suse.com/1236809", }, { category: "self", summary: "SUSE CVE CVE-2024-50379 page", url: "https://www.suse.com/security/cve/CVE-2024-50379/", }, { category: "self", summary: "SUSE CVE CVE-2024-52317 page", url: "https://www.suse.com/security/cve/CVE-2024-52317/", }, { category: "self", summary: "SUSE CVE CVE-2024-54677 page", url: "https://www.suse.com/security/cve/CVE-2024-54677/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, ], title: "Security update for tomcat10", tracking: { current_release_date: "2025-02-05T10:33:06Z", generator: { date: "2025-02-05T10:33:06Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:0033-1", initial_release_date: "2025-02-05T10:33:06Z", revision_history: [ { date: "2025-02-05T10:33:06Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat10-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-50379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50379", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-50379", url: "https://www.suse.com/security/cve/CVE-2024-50379", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-50379", url: "https://bugzilla.suse.com/1234663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "important", }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-52317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-52317", }, ], notes: [ { category: "general", text: "Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-52317", url: "https://www.suse.com/security/cve/CVE-2024-52317", }, { category: "external", summary: "SUSE Bug 1233435 for CVE-2024-52317", url: "https://bugzilla.suse.com/1233435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "moderate", }, ], title: "CVE-2024-52317", }, { cve: "CVE-2024-54677", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-54677", }, ], notes: [ { category: "general", text: "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-54677", url: "https://www.suse.com/security/cve/CVE-2024-54677", }, { category: "external", summary: "SUSE Bug 1234664 for CVE-2024-54677", url: "https://bugzilla.suse.com/1234664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "important", }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "important", }, ], title: "CVE-2024-56337", }, ], }
suse-su-2025:0058-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat", title: "Title of the patch", }, { category: "description", text: "This update for tomcat fixes the following issues:\n\nUpdate to Tomcat 9.0.98\n\n- Fixed CVEs:\n + CVE-2024-54677: DoS in examples web application (bsc#1234664)\n + CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663)\n + CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)\n- Catalina\n + Add: Add option to serve resources from subpath only with WebDAV Servlet\n like with DefaultServlet. (michaelo)\n + Fix: Add special handling for the protocols attribute of SSLHostConfig in\n storeconfig. (remm)\n + Fix: 69442: Fix case sensitive check on content-type when parsing request\n parameters. (remm)\n + Code: Refactor duplicate code for extracting media type and subtype from\n content-type into a single method. (markt)\n + Fix: Compatibility of generated embedded code with components where\n constructors or property related methods throw a checked exception. (remm)\n + Fix: The previous fix for inconsistent resource metadata during concurrent\n reads and writes was incomplete. (markt)\n + Fix: 69444: Ensure that the javax.servlet.error.message request attribute\n is set when an application defined error page is called. (markt)\n + Fix: Avoid quotes for numeric values in the JSON generated by the status\n servlet. (remm)\n + Add: Add strong ETag support for the WebDAV and default servlet, which can\n be enabled by using the useStrongETags init parameter with a value set to\n true. The ETag generated will be a SHA-1 checksum of the resource content.\n (remm)\n + Fix: Use client locale for directory listings. (remm)\n + Fix: 69439: Improve the handling of multiple Cache-Control headers in the\n ExpiresFilter. Based on pull request #777 by Chenjp. (markt)\n + Fix: 69447: Update the support for caching classes the web application\n class loader cannot find to take account of classes loaded from external\n repositories. Prior to this fix, these classes could be incorrectly marked\n as not found. (markt)\n + Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by\n users will not be removed and any header present in a HEAD request will\n also be present in the equivalent GET request. There may be some headers,\n as per RFC 9110, section 9.3.2, that are present in a GET request that are\n not present in the equivalent HEAD request. (markt)\n + Fix: 69471: Log instances of CloseNowException caught by\n ApplicationDispatcher.invoke() at debug level rather than error level as\n they are very likely to have been caused by a client disconnection or\n similar I/O issue. (markt)\n + Add: Add a test case for the fix for 69442. Also refactor references to\n application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.\n (markt)\n + Fix: 69476: Catch possible ISE when trying to report PUT failure in the\n DefaultServlet. (remm)\n + Add: Add support for RateLimit header fields for HTTP (draft) in the\n RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)\n + Add: #787: Add regression tests for 69478. Pull request provided by Thomas\n Krisch. (markt)\n + Fix: The default servlet now rejects HTTP range requests when two or more\n of the requested ranges overlap. Based on pull request #782 provided by\n Chenjp. (markt)\n + Fix: Enhance Content-Range verification for partial PUT requests handled\n by the default servlet. Provided by Chenjp in pull request #778. (markt)\n + Fix: Harmonize DataSourceStore lookup in the global resources to\n optionally avoid the comp/env prefix which is usually not used there.\n (remm)\n + Fix: As required by RFC 9110, the HTTP Range header will now only be\n processed for GET requests. Based on pull request #790 provided by Chenjp.\n (markt)\n + Fix: Deprecate the useAcceptRanges initialisation parameter for the\n default servlet. It will be removed in Tomcat 12 onwards where it will\n effectively be hard coded to true. (markt)\n + Add: Add DataSource based property storage for the WebdavServlet. (remm)\n- Coyote\n + Fix: Align encodedSolidusHandling with the Servlet specification. If the\n pass-through mode is used, any %25 sequences will now also be passed\n through to avoid errors and/or corruption when the application decodes the\n path. (markt)\n- Jasper\n + Fix: Further optimise EL evaluation of method parameters. Patch provided\n by Paolo B. (markt)\n + Fix: Follow-up to the fix for 69381. Apply the optimisation for method\n lookup performance in expression language to an additional location.\n (markt)\n- Web applications\n + Fix: Documentation. Remove references to the ResourceParams element.\n Support for ResourceParams was removed in Tomcat 5.5.x. (markt)\n + Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter.\n The attribute is internalProxies rather than allowedInternalProxies. Pull\n request #786 (markt)\n + Fix: Examples. Fix broken links when Servlet Request Info example is\n called via a URL that includes a pathInfo component. (markt)\n + Fix: Examples. Expand the obfuscation of session cookie values in the\n request header example to JSON responses. (markt)\n + Add: Examples. Add the ability to delete session attributes in the servlet\n session example. (markt)\n + Add: Examples. Add a hard coded limit of 10 attributes per session for the\n servlet session example. (markt)\n + Add: Examples. Add the ability to delete session attributes and add a hard\n coded limit of 10 attributes per session for the JSP form authentication\n example. (markt)\n + Add: Examples. Limit the shopping cart example to only allow adding the\n pre-defined items to the cart. (markt)\n + Fix: Examples. Remove JSP calendar example. (markt)\n- Other\n + Fix: 69465: Fix warnings during native image compilation using the Tomcat\n embedded JARs. (markt)\n + Update: Update Tomcat's fork of Commons DBCP to 2.13.0. (markt)\n + Update: Update EasyMock to 5.5.0. (markt)\n + Update: Update Checkstyle to 10.20.2. (markt)\n + Update: Update BND to 7.1.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Korean translations. (markt)\n + Add: Improvements to Chinese translations. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-58,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-58,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-58,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-58,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-58,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-58,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-58,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-58,SUSE-Storage-7.1-2025-58,openSUSE-SLE-15.6-2025-58", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0058-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:0058-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20250058-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:0058-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020086.html", }, { category: "self", summary: "SUSE Bug 1233435", url: "https://bugzilla.suse.com/1233435", }, { category: "self", summary: "SUSE Bug 1234663", url: "https://bugzilla.suse.com/1234663", }, { category: "self", summary: "SUSE Bug 1234664", url: "https://bugzilla.suse.com/1234664", }, { category: "self", summary: "SUSE Bug 1236809", url: "https://bugzilla.suse.com/1236809", }, { category: "self", summary: "SUSE CVE CVE-2024-50379 page", url: "https://www.suse.com/security/cve/CVE-2024-50379/", }, { category: "self", summary: "SUSE CVE CVE-2024-52317 page", url: "https://www.suse.com/security/cve/CVE-2024-52317/", }, { category: "self", summary: "SUSE CVE CVE-2024-54677 page", url: "https://www.suse.com/security/cve/CVE-2024-54677/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, ], title: "Security update for tomcat", tracking: { current_release_date: "2025-02-05T10:34:01Z", generator: { date: "2025-02-05T10:34:01Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:0058-1", initial_release_date: "2025-02-05T10:34:01Z", revision_history: [ { date: "2025-02-05T10:34:01Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat-9.0.98-150200.74.1.noarch", product: { name: "tomcat-9.0.98-150200.74.1.noarch", product_id: "tomcat-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", product: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", product_id: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", product: { name: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", product_id: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", product: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", product_id: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-embed-9.0.98-150200.74.1.noarch", product: { name: "tomcat-embed-9.0.98-150200.74.1.noarch", product_id: "tomcat-embed-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.98-150200.74.1.noarch", product: { name: "tomcat-javadoc-9.0.98-150200.74.1.noarch", product_id: "tomcat-javadoc-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", product: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", product_id: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.98-150200.74.1.noarch", product: { name: "tomcat-jsvc-9.0.98-150200.74.1.noarch", product_id: "tomcat-jsvc-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-lib-9.0.98-150200.74.1.noarch", product: { name: "tomcat-lib-9.0.98-150200.74.1.noarch", product_id: "tomcat-lib-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", product: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", product_id: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-webapps-9.0.98-150200.74.1.noarch", product: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch", product_id: "tomcat-webapps-9.0.98-150200.74.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.3", product: { name: "SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-embed-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-javadoc-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsvc-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-50379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50379", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-50379", url: "https://www.suse.com/security/cve/CVE-2024-50379", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-50379", url: "https://bugzilla.suse.com/1234663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "important", }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-52317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-52317", }, ], notes: [ { category: "general", text: "Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-52317", url: "https://www.suse.com/security/cve/CVE-2024-52317", }, { category: "external", summary: "SUSE Bug 1233435 for CVE-2024-52317", url: "https://bugzilla.suse.com/1233435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "moderate", }, ], title: "CVE-2024-52317", }, { cve: "CVE-2024-54677", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-54677", }, ], notes: [ { category: "general", text: "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-54677", url: "https://www.suse.com/security/cve/CVE-2024-54677", }, { category: "external", summary: "SUSE Bug 1234664 for CVE-2024-54677", url: "https://bugzilla.suse.com/1234664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "important", }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "important", }, ], title: "CVE-2024-56337", }, ], }
suse-su-2025:1126-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat", title: "Title of the patch", }, { category: "description", text: "This update for tomcat fixes the following issues:\n\n- CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with partial PUT (bsc#1239302)\n\n- Update to Tomcat 9.0.102\n * Fixes:\n + launch with java 17 (bsc#1239676)\n * Catalina\n + Fix: Weak etags in the If-Range header should not match as strong etags\n are required. (remm)\n + Fix: When looking up class loader resources by resource name, the resource\n name should not start with '/'. If the resource name does start with '/',\n Tomcat is lenient and looks it up as if the '/' was not present. When the\n web application class loader was configured with external repositories and\n names starting with '/' were used for lookups, it was possible that cached\n 'not found' results could effectively hide lookup results using the\n correct resource name. (markt)\n + Fix: Enable the JNDIRealm to validate credentials provided to\n HttpServletRequest.login(String username, String password) when the realm\n is configured to use GSSAPI authentication. (markt)\n + Fix: Fix a bug in the JRE compatibility detection that incorrectly\n identified Java 19 and Java 20 as supporting Java 21 features. (markt)\n + Fix: Improve the checks for exposure to and protection against\n CVE-2024-56337 so that reflection is not used unless required. The checks\n for whether the file system is case sensitive or not have been removed.\n (markt)\n + Fix: Avoid scenarios where temporary files used for partial PUT would not\n be deleted. (remm)\n + Fix: 69602: Fix regression in releases from 12-2024 that were too strict\n and rejected weak etags in the If-Range header. (remm)\n + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught\n exception introduced for the check for CVE-2024-56337. (remm)\n * Cluster\n + Add: 69598: Add detection of service account token changes to the\n KubernetesMembershipProvider implementation and reload the token if it\n changes. Based on a patch by Miroslav Jezbera. (markt)\n * Coyote\n + Fix: 69575: Avoid using compression if a response is already compressed\n using compress, deflate or zstd. (remm)\n + Update: Use Transfer-Encoding for compression rather than Content-Encoding\n if the client submits a TE header containing gzip. (remm)\n + Fix: Fix a race condition in the handling of HTTP/2 stream reset that\n could cause unexpected 500 responses. (markt)\n * Other\n + Add: Add makensis as an option for building the Installer for Windows on\n non-Windows platforms. (rjung/markt)\n + Update: Update Byte Buddy to 1.17.1. (markt)\n + Update: Update Checkstyle to 10.21.3. (markt)\n + Update: Update SpotBugs to 4.9.1. (markt)\n + Update: Update JSign to 7.1. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON\n documents. (remm) \n\n- Update to Tomcat 9.0.99\n * Catalina\n + Update: Add tableName configuration on the DataSourcePropertyStore that\n may be used by the WebDAV Servlet. (remm)\n + Update: Improve HTTP If headers processing according to RFC 9110. Based on\n pull request #796 by Chenjp. (remm/markt)\n + Update: Allow readOnly attribute configuration on the Resources element\n and allow configure the readOnly attribute value of the main resources.\n The attribute value will also be used by the default and WebDAV Servlets.\n (remm)\n + Fix: 69285: Optimise the creation of the parameter map for included\n requests. Based on sample code and test cases provided by John\n Engebretson. (markt)\n + Fix: 69527: Avoid rare cases where a cached resource could be set with 0\n content length, or could be evicted immediately. (remm)\n + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect\n requests without body for WebDAV LOCK and PROPFIND. (remm)\n + Fix: 69528: Add multi-release JAR support for the bloom\n archiveIndexStrategy of the Resources. (remm)\n + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based\n on a patch submitted by Chenjp. (remm)\n + Add: Add a check to ensure that, if one or more web applications are\n potentially vulnerable to CVE-2024-56337, the JVM has been configured to\n protect against the vulnerability and to configure the JVM correctly if\n not. Where one or more web applications are potentially vulnerable to\n CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be\n confirmed that the JVM has been correctly configured, prevent the impacted\n web applications from starting. (markt)\n + Fix: Remove unused session to client map from CrawlerSessionManagerValve.\n Submitted by Brian Matzon. (remm)\n + Fix: When using the WebDAV servlet with serveSubpathOnly set to true,\n ensure that the destination for any requested WebDAV operation is also\n restricted to the sub-path. (markt)\n + Fix: Generate an appropriate Allow HTTP header when the Default servlet\n returns a 405 (method not allowed) response in response to a DELETE\n request because the target resource cannot be deleted. Pull request #802\n provided by Chenjp. (markt)\n + Code: Refactor creation of RequestDispatcher instances so that the\n processing of the provided path is consistent with normal request\n processing. (markt)\n + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling\n attributes to Context to provide control over the handling of the path\n used to created a RequestDispatcher. (markt)\n + Fix: Handle a potential NullPointerException after an IOException occurs\n on a non-container thread during asynchronous processing. (markt)\n + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)\n * Coyote\n + Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does\n not support. These settings are now silently ignored. (markt)\n + Fix: Avoid a rare NullPointerException when recycling the\n Http11InputBuffer. (markt)\n + Fix: Lower the log level to debug for logging an invalid socket channel\n when processing poller events for the NIO Connector as this may occur in\n normal usage. (markt)\n + Code: Clean-up references to the HTTP/2 stream once request processing has\n completed to aid GC and reduce the size of the HTTP/2 recycled request and\n response cache. (markt)\n + Add: Add a new Connector configuration attribute,\n encodedReverseSolidusHandling, to control how %5c sequences in URLs are\n handled. The default behaviour is unchanged (decode) keeping in mind that\n the allowBackslash attribute determines how the decoded URI is processed.\n (markt)\n + Fix: 69545: Improve CRLF skipping for the available method of the\n ChunkedInputFilter. (remm)\n + Fix: Improve the performance of repeated calls to getHeader(). Pull\n request #813 provided by Adwait Kumar Singh. (markt)\n + Fix: 69559: Ensure that the Java 24 warning regarding the use of\n sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code\n will be used. (markt)\n * Jasper\n + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP\n include actions if both the page attribute and the body contained\n parameters. Pull request #803 provided by Chenjp. (markt)\n + Fix: 69521: Update the EL Parser to allow the full range of valid\n characters in an EL identifier as defined by the Java Language\n Specification. (markt)\n + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch\n provided by John Engebretson. (markt)\n * Web applications\n + Add: Documentation. Expand the description of the security implications of\n setting mapperContextRootRedirectEnabled and/or\n mapperDirectoryRedirectEnabled to true. (markt)\n + Fix: Documentation. Better document the default for the truststoreProvider\n attribute of a SSLHostConfig element. (markt)\n * Other\n + Update: Update to Commons Daemon 1.4.1. (markt)\n + Update: Update the internal fork of Commons Pool to 2.12.1. (markt)\n + Update: Update Byte Buddy to 1.16.1. (markt)\n + Update: Update UnboundID to 7.0.2. (markt)\n + Update: Update Checkstyle to 10.21.2. (markt)\n + Update: Update SpotBugs to 4.9.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Chinese translations by leeyazhou. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n ", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-1126,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1126,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1126,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1126,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1126,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1126,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1126,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1126,SUSE-Storage-7.1-2025-1126,openSUSE-SLE-15.6-2025-1126", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1126-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:1126-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20251126-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:1126-1", url: "https://lists.suse.com/pipermail/sle-updates/2025-April/038899.html", }, { category: "self", summary: "SUSE Bug 1239302", url: "https://bugzilla.suse.com/1239302", }, { category: "self", summary: "SUSE Bug 1239676", url: "https://bugzilla.suse.com/1239676", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "Security update for tomcat", tracking: { current_release_date: "2025-04-03T11:51:06Z", generator: { date: "2025-04-03T11:51:06Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:1126-1", initial_release_date: "2025-04-03T11:51:06Z", revision_history: [ { date: "2025-04-03T11:51:06Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat-9.0.102-150200.78.1.noarch", product: { name: "tomcat-9.0.102-150200.78.1.noarch", product_id: "tomcat-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", product: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", product_id: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", product: { name: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", product_id: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", product: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", product_id: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-embed-9.0.102-150200.78.1.noarch", product: { name: "tomcat-embed-9.0.102-150200.78.1.noarch", product_id: "tomcat-embed-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.102-150200.78.1.noarch", product: { name: "tomcat-javadoc-9.0.102-150200.78.1.noarch", product_id: "tomcat-javadoc-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", product: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", product_id: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.102-150200.78.1.noarch", product: { name: "tomcat-jsvc-9.0.102-150200.78.1.noarch", product_id: "tomcat-jsvc-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-lib-9.0.102-150200.78.1.noarch", product: { name: "tomcat-lib-9.0.102-150200.78.1.noarch", product_id: "tomcat-lib-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", product: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", product_id: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-webapps-9.0.102-150200.78.1.noarch", product: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch", product_id: "tomcat-webapps-9.0.102-150200.78.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.3", product: { name: "SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-embed-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-javadoc-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsvc-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-04-03T11:51:06Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-04-03T11:51:06Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
suse-su-2025:1024-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat10", title: "Title of the patch", }, { category: "description", text: "This update for tomcat10 fixes the following issues:\n\n- CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with\n partial PUT (bsc#1239302)\n\nOther fixes:\n\n- Update to Tomcat 10.1.39\n * Fixes:\n + launch with java 17 (bsc#1239676)\n * Catalina\n + Fix: 69602: Fix regression in releases from 12-2024 that were too strict\n and rejected weak etags in the If-Range header with a 400 response.\n Instead will consider it as a failed match since strong etags are required\n for If-Range. (remm)\n + Fix: When looking up class loader resources by resource name, the resource\n name should not start with '/'. If the resource name does start with '/',\n Tomcat is lenient and looks it up as if the '/' was not present. When the\n web application class loader was configured with external repositories and\n names starting with '/' were used for lookups, it was possible that cached\n 'not found' results could effectively hide lookup results using the\n correct resource name. (markt)\n + Fix: Enable the JNDIRealm to validate credentials provided to\n HttpServletRequest.login(String username, String password) when the realm\n is configured to use GSSAPI authentication. (markt)\n + Fix: Fix a bug in the JRE compatibility detection that incorrectly\n identified Java 19 and Java 20 as supporting Java 21 features. (markt)\n + Fix: Improve the checks for exposure to and protection against\n CVE-2024-56337 so that reflection is not used unless required. The checks\n for whether the file system is case sensitive or not have been removed.\n (markt)\n + Add: Add support for logging the connection ID (as returned by\n ServletRequest.getServletConnection().getConnectionId()) with the\n AccessLogValve and ExtendedAccessLogValve. Based on pull request #814 by\n Dmole. (markt)\n + Fix: Avoid scenarios where temporary files used for partial PUT would not\n be deleted. (remm)\n + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught\n exception introduced for the check for CVE-2024-56337. (remm)\n * Cluster\n + Add: 69598: Add detection of service account token changes to the\n KubernetesMembershipProvider implementation and reload the token if it\n changes. Based on a patch by Miroslav Jezbera. (markt)\n * Coyote\n + Fix: 69575: Avoid using compression if a response is already compressed\n using compress, deflate or zstd. (remm)\n + Update: Use Transfer-Encoding for compression rather than Content-Encoding\n if the client submits a TE header containing gzip. (remm)\n + Fix: Fix a race condition in the handling of HTTP/2 stream reset that\n could cause unexpected 500 responses. (markt)\n * Other\n + Add: Add makensis as an option for building the Installer for Windows on\n non-Windows platforms. (rjung/markt)\n + Update: Update Byte Buddy to 1.17.1. (markt)\n + Update: Update Checkstyle to 10.21.3. (markt)\n + Update: Update SpotBugs to 4.9.1. (markt)\n + Update: Update JSign to 7.1. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON\n documents. (remm) \n\n- Update to Tomcat 10.1.35\n * Catalina\n + Update: Add tableName configuration on the DataSourcePropertyStore that\n may be used by the WebDAV Servlet. (remm)\n + Update: Improve HTTP If headers processing according to RFC 9110. Based on\n pull request #796 by Chenjp. (remm/markt)\n + Update: Allow readOnly attribute configuration on the Resources element\n and allow configure the readOnly attribute value of the main resources.\n The attribute value will also be used by the default and WebDAV Servlets.\n (remm)\n + Fix: 69285: Optimise the creation of the parameter map for included\n requests. Based on sample code and test cases provided by John\n Engebretson. (markt)\n + Fix: 69527: Avoid rare cases where a cached resource could be set with 0\n content length, or could be evicted immediately. (remm)\n + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect\n requests without body for WebDAV LOCK and PROPFIND. (remm)\n + Fix: 69528: Add multi-release JAR support for the bloom\n archiveIndexStrategy of the Resources. (remm)\n + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based\n on a patch submitted by Chenjp. (remm)\n + Fix: Remove unused session to client map from CrawlerSessionManagerValve.\n Submitted by Brian Matzon. (remm)\n + Add: Add a check to ensure that, if one or more web applications are\n potentially vulnerable to CVE-2024-56337, the JVM has been configured to\n protect against the vulnerability and to configure the JVM correctly if\n not. Where one or more web applications are potentially vulnerable to\n CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be\n confirmed that the JVM has been correctly configured, prevent the impacted\n web applications from starting. (markt)\n + Fix: When using the WebDAV servlet with serveSubpathOnly set to true,\n ensure that the destination for any requested WebDAV operation is also\n restricted to the sub-path. (markt)\n + Fix: Generate an appropriate Allow HTTP header when the Default servlet\n returns a 405 (method not allowed) response in response to a DELETE\n request because the target resource cannot be deleted. Pull request #802\n provided by Chenjp. (markt)\n + Code: Refactor creation of RequestDispatcher instances so that the\n processing of the provided path is consistent with normal request\n processing. (markt)\n + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling\n attributes to Context to provide control over the handling of the path\n used to created a RequestDispatcher. (markt)\n + Fix: Handle a potential NullPointerException after an IOException occurs\n on a non-container thread during asynchronous processing. (markt)\n + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)\n * Coyote\n + Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does\n not support. These settings are now silently ignored. (markt)\n + Fix: Avoid a rare NullPointerException when recycling the\n Http11InputBuffer. (markt)\n + Fix: Lower the log level to debug for logging an invalid socket channel\n when processing poller events for the NIO Connector as this may occur in\n normal usage. (markt)\n + Code: Clean-up references to the HTTP/2 stream once request processing has\n completed to aid GC and reduce the size of the HTTP/2 recycled request and\n response cache. (markt)\n + Add: Add a new Connector configuration attribute,\n encodedReverseSolidusHandling, to control how %5c sequences in URLs are\n handled. The default behaviour is unchanged (decode) keeping in mind that\n the allowBackslash attribute determines how the decoded URI is processed.\n (markt)\n + Fix: 69545: Improve CRLF skipping for the available method of the\n ChunkedInputFilter. (remm)\n + Fix: Improve the performance of repeated calls to getHeader(). Pull\n request #813 provided by Adwait Kumar Singh. (markt)\n + Fix: 69559: Ensure that the Java 24 warning regarding the use of\n sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code\n will be used. (markt)\n * Jasper\n + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP\n include actions if both the page attribute and the body contained\n parameters. Pull request #803 provided by Chenjp. (markt)\n + Fix: Update the identifier validation in the Expression Language parser to\n reflect that, as of Java 9, _ is also a Java keyword and may not be used\n as an identifier. (markt)\n + Fix: 69521: Update the EL Parser to allow the full range of valid\n characters in an EL identifier as defined by the Java Language\n Specification. (markt)\n + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch\n provided by John Engebretson. (markt)\n * Web applications\n + Add: Documentation. Expand the description of the security implications of\n setting mapperContextRootRedirectEnabled and/or\n mapperDirectoryRedirectEnabled to true. (markt)\n + Fix: Documentation. Better document the default for the truststoreProvider\n attribute of a SSLHostConfig element. (markt)\n * Other\n + Update: Update to Commons Daemon 1.4.1. (markt)\n + Update: Update the packaged version of the Tomcat Migration Tool for\n Jakarta EE to 1.0.9. (markt)\n + Update: Update the internal fork of Commons Pool to 2.12.1. (markt)\n + Update: Update Byte Buddy to 1.16.1. (markt)\n + Update: Update UnboundID to 7.0.2. (markt)\n + Update: Update Checkstyle to 10.21.2. (markt)\n + Update: Update SpotBugs to 4.9.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Chinese translations by leeyazhou. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt) \n + Add: Improvements to Japanese translations by tak7iji. (markt)", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-1024,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1024,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1024,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1024,openSUSE-SLE-15.6-2025-1024", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1024-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:1024-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20251024-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:1024-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020602.html", }, { category: "self", summary: "SUSE Bug 1239302", url: "https://bugzilla.suse.com/1239302", }, { category: "self", summary: "SUSE Bug 1239676", url: "https://bugzilla.suse.com/1239676", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "Security update for tomcat10", tracking: { current_release_date: "2025-03-26T11:29:12Z", generator: { date: "2025-03-26T11:29:12Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:1024-1", initial_release_date: "2025-03-26T11:29:12Z", revision_history: [ { date: "2025-03-26T11:29:12Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat10-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-03-26T11:29:12Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-03-26T11:29:12Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
fkie_cve-2024-56337
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ cveTags: [], descriptions: [ { lang: "en", value: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", }, { lang: "es", value: "Vulnerabilidad de condición de ejecución de tiempo de uso y tiempo de verificación (TOCTOU) en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.1, desde 10.1.0-M1 hasta 10.1.33, desde 9.0.0.M1 hasta 9.0.97. La mitigación de CVE-2024-50379 fue incompleta. Los usuarios que ejecuten Tomcat en un sistema de archivos que no distinga entre mayúsculas y minúsculas con la escritura del servlet predeterminada habilitada (el parámetro de inicialización de solo lectura establecido en el valor no predeterminado de falso) pueden necesitar una configuración adicional para mitigar por completo CVE-2024-50379 según la versión de Java que estén usando con Tomcat: - ejecutándose en Java 8 o Java 11: la propiedad del sistema sun.io.useCanonCaches debe establecerse explícitamente en falso (el valor predeterminado es verdadero) - ejecutándose en Java 17: la propiedad del sistema sun.io.useCanonCaches, si está establecida, debe establecerse en falso (el valor predeterminado es falso) - ejecutándose en Java 21 en adelante: no se requiere ninguna configuración adicional (la propiedad del sistema y el caché problemático se han eliminado) Tomcat 11.0.3, 10.1.35 y 9.0.99 en adelante incluirán comprobaciones de que sun.io.useCanonCaches esté configurado correctamente antes de permitir que el servlet predeterminado esté habilitado para escritura en un sistema de archivos que no distinga entre mayúsculas y minúsculas. Tomcat también establecerá sun.io.useCanonCaches como falso de forma predeterminada cuando sea posible.", }, ], id: "CVE-2024-56337", lastModified: "2025-01-03T12:15:26.787", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-12-20T16:15:24.260", references: [ { source: "security@apache.org", url: "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", }, { source: "security@apache.org", url: "https://www.cve.org/CVERecord?id=CVE-2024-50379", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20250103-0002/", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Awaiting Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-367", }, ], source: "security@apache.org", type: "Secondary", }, ], }
ghsa-27hp-xhwr-wr2m
Vulnerability from github
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The mitigation for CVE-2024-50379 was incomplete.
Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)
Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
{ affected: [ { package: { ecosystem: "Maven", name: "org.apache.tomcat:tomcat-catalina", }, ranges: [ { events: [ { introduced: "11.0.0-M1", }, { fixed: "11.0.2", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat:tomcat-catalina", }, ranges: [ { events: [ { introduced: "10.1.0-M1", }, { fixed: "10.1.34", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "9.0.0.M1", }, { fixed: "9.0.98", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat.embed:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "11.0.0-M1", }, { fixed: "11.0.2", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat.embed:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "10.1.0-M1", }, { fixed: "10.1.34", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat.embed:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "9.0.0.M1", }, { fixed: "9.0.98", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2024-56337", ], database_specific: { cwe_ids: [ "CWE-367", ], github_reviewed: true, github_reviewed_at: "2024-12-20T19:50:45Z", nvd_published_at: "2024-12-20T16:15:24Z", severity: "HIGH", }, details: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", id: "GHSA-27hp-xhwr-wr2m", modified: "2025-01-08T16:05:12Z", published: "2024-12-20T18:31:32Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", }, { type: "PACKAGE", url: "https://github.com/apache/tomcat", }, { type: "WEB", url: "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20250103-0002", }, { type: "WEB", url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34", }, { type: "WEB", url: "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2", }, { type: "WEB", url: "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98", }, { type: "WEB", url: "https://www.cve.org/CVERecord?id=CVE-2024-50379", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", type: "CVSS_V4", }, ], summary: "Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.