Vulnerabilites related to ibm - semeru_runtime
CVE-2024-22361 (GCVE-0-2024-22361)
Vulnerability from cvelistv5
Published
2024-02-10 15:13
Modified
2024-08-19 16:09
CWE
  • CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Summary
IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 281222.
Impacted products
Vendor Product Version
IBM Semeru Runtime Version: 8.0.302.0    8.0.392.0
Version: 11.0.12.0    11.0.21.0
Version: 17.0.1.0    17.0.9.0
Version: 21.0.1.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:43:34.525Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.ibm.com/support/pages/node/7116431"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281222"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22361",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-19T16:09:33.481630Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-19T16:09:36.910Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Semeru Runtime",
          "vendor": "IBM",
          "versions": [
            {
              "lessThanOrEqual": "8.0.392.0",
              "status": "affected",
              "version": "8.0.302.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.0.21.0",
              "status": "affected",
              "version": "11.0.12.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "17.0.9.0",
              "status": "affected",
              "version": "17.0.1.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "21.0.1.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.  IBM X-Force ID:  281222."
            }
          ],
          "value": "IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.  IBM X-Force ID:  281222."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-327",
              "description": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-10T15:13:01.991Z",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.ibm.com/support/pages/node/7116431"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281222"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "IBM Semeru Runtime information disclosure",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2024-22361",
    "datePublished": "2024-02-10T15:13:01.991Z",
    "dateReserved": "2024-01-08T23:42:36.759Z",
    "dateUpdated": "2024-08-19T16:09:36.910Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2900 (GCVE-0-2025-2900)
Vulnerability from cvelistv5
Published
2025-05-14 18:50
Modified
2025-05-14 19:43
CWE
  • CWE-122 - Heap-based Buffer Overflow
Summary
IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation.
References
Impacted products
Vendor Product Version
IBM Semeru Runtime Version: 8.0.302.0    8.0.442.0
Version: 11.0.12.0    11.0.26.0
Version: 17.0.0.0    17.0.14.0
Version: 21.0.0.0    21.0.6.0
    cpe:2.3:a:ibm:semeru_runtime:8.0.302.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:semeru_runtime:8.0.442.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:semeru_runtime:11.0.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:semeru_runtime:11.0.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:semeru_runtime:17.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:semeru_runtime:17.0.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:semeru_runtime:21.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:semeru_runtime:21.0.6.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2900",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-14T19:42:43.060744Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-14T19:43:19.127Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:ibm:semeru_runtime:8.0.302.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:semeru_runtime:8.0.442.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:semeru_runtime:11.0.12.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:semeru_runtime:11.0.26.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:semeru_runtime:17.0.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:semeru_runtime:17.0.14.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:semeru_runtime:21.0.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:semeru_runtime:21.0.6.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "Semeru Runtime",
          "vendor": "IBM",
          "versions": [
            {
              "lessThanOrEqual": "8.0.442.0",
              "status": "affected",
              "version": "8.0.302.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.0.26.0",
              "status": "affected",
              "version": "11.0.12.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "17.0.14.0",
              "status": "affected",
              "version": "17.0.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "21.0.6.0",
              "status": "affected",
              "version": "21.0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation."
            }
          ],
          "value": "IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-14T18:50:27.327Z",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.ibm.com/support/pages/node/7233415"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Remediation/Fixes\u003cbr\u003e\u003cbr\u003e8.0.452.0\u003cbr\u003e11.0.27.0\u003cbr\u003e17.0.15.0\u003cbr\u003e21.0.7.0\u003cbr\u003e\u003cbr\u003eIBM Semeru Runtime releases can be downloaded from the GitHub repositories for Semeru 8, Semeru 11, Semeru 17, and Semeru 21 and from the IBM Semeru Developer Center.\u003cbr\u003e\u003cbr\u003eIBM customers requiring an update for an SDK shipped with an IBM product should contact IBM support, and/or refer to the appropriate product security bulletin.\u003cbr\u003e"
            }
          ],
          "value": "Remediation/Fixes\n\n8.0.452.0\n11.0.27.0\n17.0.15.0\n21.0.7.0\n\nIBM Semeru Runtime releases can be downloaded from the GitHub repositories for Semeru 8, Semeru 11, Semeru 17, and Semeru 21 and from the IBM Semeru Developer Center.\n\nIBM customers requiring an update for an SDK shipped with an IBM product should contact IBM support, and/or refer to the appropriate product security bulletin."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "IBM Semeru Runtime denial of service",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2025-2900",
    "datePublished": "2025-05-14T18:50:27.327Z",
    "dateReserved": "2025-03-28T02:06:38.367Z",
    "dateUpdated": "2025-05-14T19:43:19.127Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2024-02-10 15:15
Modified
2024-11-21 08:56
Summary
IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 281222.
Impacted products
Vendor Product Version
ibm semeru_runtime *
ibm semeru_runtime *
ibm semeru_runtime *
ibm semeru_runtime 21.0.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA4B8B66-3303-490C-9D3B-22188FD257D0",
              "versionEndExcluding": "8.0.402.0",
              "versionStartIncluding": "8.0.302.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53915283-E1D3-4F1A-8D29-66CCD1866D73",
              "versionEndExcluding": "11.0.22.0",
              "versionStartIncluding": "11.0.12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E533B3E9-400B-41D8-9637-D4B6C6F6D3D7",
              "versionEndExcluding": "17.0.10.0",
              "versionStartIncluding": "17.0.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:21.0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D5749EB-5EEB-44C2-AA0F-51A311F6E587",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.  IBM X-Force ID:  281222."
    },
    {
      "lang": "es",
      "value": "IBM Semeru Runtime 8.0.302.0 a 8.0.392.0, 11.0.12.0 a 11.0.21.0, 17.0.1.0 - 17.0.9.0 y 21.0.1.0 utiliza algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles de lo esperado que podr\u00edan permitir a un atacante descifrar informaci\u00f3n altamente confidencial. ID de IBM X-Force: 281222."
    }
  ],
  "id": "CVE-2024-22361",
  "lastModified": "2024-11-21T08:56:07.240",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "psirt@us.ibm.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-10T15:15:35.667",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281222"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ibm.com/support/pages/node/7116431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ibm.com/support/pages/node/7116431"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "psirt@us.ibm.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-05-14 19:15
Modified
2025-08-19 19:14
Summary
IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7BBE52B-E146-4F12-A1C6-9E52E25E0F47",
              "versionEndIncluding": "8.0.442.0",
              "versionStartIncluding": "8.0.302.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB568CA3-4FEC-44AC-9561-012F8801F234",
              "versionEndIncluding": "11.026.0",
              "versionStartIncluding": "11.0.12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5D9E8D4-0E2B-47F9-896E-4A9CF7E4BC8C",
              "versionEndIncluding": "17.0.14.0",
              "versionStartIncluding": "17.0.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "988591A6-8853-4B4B-A936-275366455364",
              "versionEndIncluding": "21.0.6.0",
              "versionStartIncluding": "21.0.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation."
    },
    {
      "lang": "es",
      "value": "IBM Semeru Runtime 8.0.302.0 a 8.0.442.0, 11.0.12.0 a 11.0.26.0, 17.0.0.0 a 17.0.14.0 y 21.0.0.0 a 12.0.6.0 es vulnerable a una denegaci\u00f3n de servicio causada por un desbordamiento de b\u00fafer y un bloqueo posterior, debido a un defecto en su implementaci\u00f3n de cifrado AES/CBC nativa."
    }
  ],
  "id": "CVE-2025-2900",
  "lastModified": "2025-08-19T19:14:18.293",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "psirt@us.ibm.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-05-14T19:15:52.690",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ibm.com/support/pages/node/7233415"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "psirt@us.ibm.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}