Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-56337 (GCVE-0-2024-56337)
Vulnerability from cvelistv5
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
► | URL | Tags | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 11.0.0-M1 ≤ 11.0.1 Version: 10.1.0-M1 ≤ 10.1.33 Version: 9.0.0.M1 ≤ 9.0.97 Version: 8.5.0 ≤ 8.5.100 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-56337", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-13T13:28:46.946742Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-13T13:29:16.513Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-01-03T12:04:31.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250103-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Tomcat", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "11.0.1", "status": "affected", "version": "11.0.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "10.1.33", "status": "affected", "version": "10.1.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "9.0.97", "status": "affected", "version": "9.0.0.M1", "versionType": "semver" }, { "lessThanOrEqual": "8.5.100", "status": "affected", "version": "8.5.0", "versionType": "semver" }, { "lessThan": "8.5.0", "status": "unknown", "version": "3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "This vulnerability was first reported by Nacl, WHOAMI, Yemoli and Ruozhi." }, { "lang": "en", "type": "finder", "value": "This vulnerability was independently reported with a very helpful PoC by dawu@knownsec 404 team and Sunflower@knownsec 404 team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eTime-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\u003cbr\u003eThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eThe mitigation for CVE-2024-50379 was incomplete.\u003c/p\u003e\u003cp\u003eUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\u003cbr\u003e- running on Java 8 or Java 11: the system property\u0026nbsp;sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\u003cbr\u003e- running on Java 17: the\u0026nbsp;system property sun.io.useCanonCaches, if set, must be set to false\u0026nbsp;(it defaults to false)\u003cbr\u003e- running on Java 21 onwards: no further configuration is required\u0026nbsp;(the system property and the problematic cache have been removed)\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u0026nbsp;sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u0026nbsp;sun.io.useCanonCaches to false by default where it can.\u003c/span\u003e\u003c/p\u003e" } ], "value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the\u00a0system property sun.io.useCanonCaches, if set, must be set to false\u00a0(it defaults to false)\n- running on Java 21 onwards: no further configuration is required\u00a0(the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u00a0sun.io.useCanonCaches to false by default where it can." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-08T11:24:57.945Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" }, { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-56337", "datePublished": "2024-12-20T15:28:54.738Z", "dateReserved": "2024-12-20T11:16:29.949Z", "dateUpdated": "2025-08-13T13:29:16.513Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-56337\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-12-20T16:15:24.260\",\"lastModified\":\"2025-08-08T12:15:27.340\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \\nmay also be affected.\\n\\n\\nThe mitigation for CVE-2024-50379 was incomplete.\\n\\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\\n- running on Java 8 or Java 11: the system property\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\\n- running on Java 17: the\u00a0system property sun.io.useCanonCaches, if set, must be set to false\u00a0(it defaults to false)\\n- running on Java 21 onwards: no further configuration is required\u00a0(the system property and the problematic cache have been removed)\\n\\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u00a0sun.io.useCanonCaches to false by default where it can.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de uso y tiempo de verificaci\u00f3n (TOCTOU) en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.1, desde 10.1.0-M1 hasta 10.1.33, desde 9.0.0.M1 hasta 9.0.97. La mitigaci\u00f3n de CVE-2024-50379 fue incompleta. Los usuarios que ejecuten Tomcat en un sistema de archivos que no distinga entre may\u00fasculas y min\u00fasculas con la escritura del servlet predeterminada habilitada (el par\u00e1metro de inicializaci\u00f3n de solo lectura establecido en el valor no predeterminado de falso) pueden necesitar una configuraci\u00f3n adicional para mitigar por completo CVE-2024-50379 seg\u00fan la versi\u00f3n de Java que est\u00e9n usando con Tomcat: - ejecut\u00e1ndose en Java 8 o Java 11: la propiedad del sistema sun.io.useCanonCaches debe establecerse expl\u00edcitamente en falso (el valor predeterminado es verdadero) - ejecut\u00e1ndose en Java 17: la propiedad del sistema sun.io.useCanonCaches, si est\u00e1 establecida, debe establecerse en falso (el valor predeterminado es falso) - ejecut\u00e1ndose en Java 21 en adelante: no se requiere ninguna configuraci\u00f3n adicional (la propiedad del sistema y el cach\u00e9 problem\u00e1tico se han eliminado) Tomcat 11.0.3, 10.1.35 y 9.0.99 en adelante incluir\u00e1n comprobaciones de que sun.io.useCanonCaches est\u00e9 configurado correctamente antes de permitir que el servlet predeterminado est\u00e9 habilitado para escritura en un sistema de archivos que no distinga entre may\u00fasculas y min\u00fasculas. Tomcat tambi\u00e9n establecer\u00e1 sun.io.useCanonCaches como falso de forma predeterminada cuando sea posible.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.0.98\",\"matchCriteriaId\":\"4A10E3B7-32E3-40A9-9633-CAA2F1E2EFA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.0\",\"versionEndExcluding\":\"10.1.34\",\"matchCriteriaId\":\"499AC261-223E-483B-81AF-AFD6BEA35502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.0.2\",\"matchCriteriaId\":\"EC54C74D-E851-4A9A-9C49-B8C80D5502AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://www.cve.org/CVERecord?id=CVE-2024-50379\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250103-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250103-0002/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-03T12:04:31.817Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56337\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-13T13:28:46.946742Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-31T18:50:23.435Z\"}}], \"cna\": {\"title\": \"Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This vulnerability was first reported by Nacl, WHOAMI, Yemoli and Ruozhi.\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This vulnerability was independently reported with a very helpful PoC by dawu@knownsec 404 team and Sunflower@knownsec 404 team\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.0.1\"}, {\"status\": \"affected\", \"version\": \"10.1.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.1.33\"}, {\"status\": \"affected\", \"version\": \"9.0.0.M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.0.97\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.100\"}, {\"status\": \"unknown\", \"version\": \"3\", \"lessThan\": \"8.5.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.cve.org/CVERecord?id=CVE-2024-50379\", \"tags\": [\"vdb-entry\"]}, {\"url\": \"https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \\nmay also be affected.\\n\\n\\nThe mitigation for CVE-2024-50379 was incomplete.\\n\\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\\n- running on Java 8 or Java 11: the system property\\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\\n- running on Java 17: the\\u00a0system property sun.io.useCanonCaches, if set, must be set to false\\u00a0(it defaults to false)\\n- running on Java 21 onwards: no further configuration is required\\u00a0(the system property and the problematic cache have been removed)\\n\\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\\u00a0sun.io.useCanonCaches to false by default where it can.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eTime-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\u003cbr\u003eThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \\nmay also be affected.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eThe mitigation for CVE-2024-50379 was incomplete.\u003c/p\u003e\u003cp\u003eUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\u003cbr\u003e- running on Java 8 or Java 11: the system property\u0026nbsp;sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\u003cbr\u003e- running on Java 17: the\u0026nbsp;system property sun.io.useCanonCaches, if set, must be set to false\u0026nbsp;(it defaults to false)\u003cbr\u003e- running on Java 21 onwards: no further configuration is required\u0026nbsp;(the system property and the problematic cache have been removed)\u003c/p\u003e\u003cp\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003eTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u0026nbsp;sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u0026nbsp;sun.io.useCanonCaches to false by default where it can.\u003c/span\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-08-08T11:24:57.945Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-56337\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-13T13:29:16.513Z\", \"dateReserved\": \"2024-12-20T11:16:29.949Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-12-20T15:28:54.738Z\", \"assignerShortName\": \"apache\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ncsc-2025-0021
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "general", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" }, { "category": "general", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "general", "text": "Insertion of Sensitive Information Into Sent Data", "title": "CWE-201" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Expected Behavior Violation", "title": "CWE-440" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Use of Password Hash Instead of Password for Authentication", "title": "CWE-836" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Relative Path Traversal", "title": "CWE-23" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "User Interface (UI) Misrepresentation of Critical Information", "title": "CWE-451" }, { "category": "general", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "general", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Uncaught Exception", "title": "CWE-248" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Generation of Error Message Containing Sensitive Information", "title": "CWE-209" }, { "category": "general", "text": "Incorrect Default Permissions", "title": "CWE-276" }, { "category": "general", "text": "Authentication Bypass by Capture-replay", "title": "CWE-294" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2025-01-22T13:30:50.189632Z", "id": "NCSC-2025-0021", "initial_release_date": "2025-01-22T13:30:50.189632Z", "revision_history": [ { "date": "2025-01-22T13:30:50.189632Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1727475", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670430", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635320", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670439", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670429", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670435", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670431", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670436", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670432", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635321", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674642", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670434", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674637", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670438", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635315", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670433", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674641", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670437", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635308", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications__10.4.0.4", "product": { "name": "communications__10.4.0.4", "product_id": "CSAFPID-1674629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.2", "product": { "name": "communications___23.4.2", "product_id": "CSAFPID-1670442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.3", "product": { "name": "communications___23.4.3", "product_id": "CSAFPID-1635325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.4", "product": { "name": "communications___23.4.4", "product_id": "CSAFPID-1635326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.5", "product": { "name": "communications___23.4.5", "product_id": "CSAFPID-1674645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.6", "product": { "name": "communications___23.4.6", "product_id": "CSAFPID-1674646", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___24.2.0", "product": { "name": "communications___24.2.0", "product_id": "CSAFPID-1674644", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___7.2.1.0.0", "product": { "name": "communications___7.2.1.0.0", "product_id": "CSAFPID-1670441", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.6", "product": { "name": "communications___8.6.0.6", "product_id": "CSAFPID-1635327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.8", "product": { "name": "communications___8.6.0.8", "product_id": "CSAFPID-1635328", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.2", "product": { "name": "communications___9.0.2", "product_id": "CSAFPID-1670440", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.3", "product": { "name": "communications___9.0.3", "product_id": "CSAFPID-1635329", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.1.1.8.0", "product": { "name": "communications___9.1.1.8.0", "product_id": "CSAFPID-1674643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674621", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751381", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751383", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751378", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751377", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674618", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674619", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674617", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751380", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1751379", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674620", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___12.0.6.0.0", "product": { "name": "communications_applications___12.0.6.0.0", "product_id": "CSAFPID-1674627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___5.5.22", "product": { "name": "communications_applications___5.5.22", "product_id": "CSAFPID-1674626", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.3", "product": { "name": "communications_applications___6.0.3", "product_id": "CSAFPID-1674628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.4", "product": { "name": "communications_applications___6.0.4", "product_id": "CSAFPID-1674624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.5", "product": { "name": "communications_applications___6.0.5", "product_id": "CSAFPID-1674625", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-764735", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-1751255", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-1751254", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-816793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-912557", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-764247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-1650820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-912556", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-1751303", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220055", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1503577", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1751300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764237", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1650752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1673396", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1751085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1751079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673526", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673391", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1751253", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816769", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-912085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1503578", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673389", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1751090", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673421", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673420", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1751246", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-912068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-1503579", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-816772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-912076", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1503580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-219838", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-611387", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-816773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912101", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1503581", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1751208", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1751209", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912539", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912540", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912541", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912542", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912543", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816346", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912077", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1503322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673415", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1751231", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816348", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-912545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816347", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673494", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-764240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1650751", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-912069", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1751225", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1751088", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1751089", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-816778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-614517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673392", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1503582", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1751081", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1751084", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503583", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503585", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1672767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1751241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90016", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816349", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1673399", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751080", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1751082", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-1751229", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-1751230", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503599", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-1751292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-1751294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-224793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-1751295", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-816794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-342793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1650777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-816350", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1261", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-1672764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1503588", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751104", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-40293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751237", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751097", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-611413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1751211", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912551", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912552", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1751243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-764242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-819413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-819414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-816780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-912553", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-219803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-204622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-219909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-816351", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-1751218", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-611595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816353", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816352", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1673414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816783", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816786", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816785", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816788", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-342803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1650778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-816354", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-204563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-219776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-765242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-916906", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-1751247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-1751248", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-93781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-220132", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-912079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-221118", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-1673496", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence", "product": { "name": "communications_performance_intelligence", "product_id": "CSAFPID-1503591", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-764738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-816355", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816359", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816358", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816357", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-912558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1751233", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503602", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1751234", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816797", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503592", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503593", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1672762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503594", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-342804", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-819415", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-819416", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-816791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-240600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1650731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673530", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1751235", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1751296", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-764739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-8984", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-219826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-912073", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503596", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503598", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1751217", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-912080", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1673481", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1751258", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-912554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-41727", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41727", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json" } ], "title": "CVE-2022-41727" }, { "cve": "CVE-2023-4408", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-4408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json" } ], "title": "CVE-2023-4408" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5981", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" } ], "product_status": { "known_affected": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481" ] } ], "title": "CVE-2023-5981" }, { "cve": "CVE-2023-6597", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "other", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6597", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097" ] } ], "title": "CVE-2023-6597" }, { "cve": "CVE-2023-7256", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2023-7256", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] } ], "title": "CVE-2023-7256" }, { "cve": "CVE-2023-29407", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29407", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2023-29407" }, { "cve": "CVE-2023-29408", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2023-29408" }, { "cve": "CVE-2023-40577", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2023-40577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751209" ] } ], "title": "CVE-2023-40577" }, { "cve": "CVE-2023-46218", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information Into Sent Data", "title": "CWE-201" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46218", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] } ], "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46219", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" } ], "product_status": { "known_affected": [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211" ] } ], "title": "CVE-2023-46219" }, { "cve": "CVE-2023-46604", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46604", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104" ] } ], "title": "CVE-2023-46604" }, { "cve": "CVE-2023-50868", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2023-50868", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json" } ], "title": "CVE-2023-50868" }, { "cve": "CVE-2024-0232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650777", "CSAFPID-1650778", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json" } ], "title": "CVE-2024-0232" }, { "cve": "CVE-2024-0397", "product_status": { "known_affected": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0397", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] } ], "title": "CVE-2024-0397" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-1442", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1442", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-1442" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "other", "text": "Authentication Bypass by Capture-replay", "title": "CWE-294" }, { "category": "other", "text": "Use of Password Hash Instead of Password for Authentication", "title": "CWE-836" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "User Interface (UI) Misrepresentation of Critical Information", "title": "CWE-451" }, { "category": "other", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" } ], "product_status": { "known_affected": [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253" ] }, "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-4030", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2024-4030" }, { "cve": "CVE-2024-4032", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "other", "text": "Expected Behavior Violation", "title": "CWE-440" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2024-4032" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" } ], "product_status": { "known_affected": [ "CSAFPID-1751090", "CSAFPID-1751253" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751090", "CSAFPID-1751253" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751209" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "product_status": { "known_affected": [ "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530" ] } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-7885", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7885", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] } ], "title": "CVE-2024-7885" }, { "cve": "CVE-2024-8006", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-8006", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079" ] } ], "title": "CVE-2024-8006" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1751253" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json" } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-22195", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085" ] } ], "title": "CVE-2024-22195" }, { "cve": "CVE-2024-24786", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24786", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-24786" }, { "cve": "CVE-2024-24791", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751209" ] } ], "title": "CVE-2024-24791" }, { "cve": "CVE-2024-25638", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25638", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] } ], "title": "CVE-2024-25638" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27309", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27309", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-27309" }, { "cve": "CVE-2024-28219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547" ] } ], "title": "CVE-2024-28219" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28834", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "notes": [ { "category": "other", "text": "Uncaught Exception", "title": "CWE-248" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28835", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590" ] } ], "title": "CVE-2024-28835" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33599", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33600", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "other", "text": "Reachable Assertion", "title": "CWE-617" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35195", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "other", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" } ], "product_status": { "known_affected": [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-35195" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "other", "text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "title": "CWE-338" } ], "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38807", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "other", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" } ], "product_status": { "known_affected": [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-38807" }, { "cve": "CVE-2024-38809", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673393" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38809", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-1673393" ] } ], "title": "CVE-2024-38809" }, { "cve": "CVE-2024-38816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Relative Path Traversal", "title": "CWE-23" } ], "product_status": { "known_affected": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225" ] } ], "title": "CVE-2024-38816" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38820", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241" ] } ], "title": "CVE-2024-38820" }, { "cve": "CVE-2024-38827", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38827", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-38827" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-41817", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079" ] } ], "title": "CVE-2024-41817" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-47535", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-47535" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47561", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2024-47561" }, { "cve": "CVE-2024-47803", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "notes": [ { "category": "other", "text": "Generation of Error Message Containing Sensitive Information", "title": "CWE-209" } ], "product_status": { "known_affected": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47803", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] } ], "title": "CVE-2024-47803" }, { "cve": "CVE-2024-47804", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "other", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47804", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085" ] } ], "title": "CVE-2024-47804" }, { "cve": "CVE-2024-49766", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209" ] }, "references": [ { "category": "self", "summary": "CVE-2024-49766", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209" ] } ], "title": "CVE-2024-49766" }, { "cve": "CVE-2024-49767", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] }, "references": [ { "category": "self", "summary": "CVE-2024-49767", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231" ] } ], "title": "CVE-2024-49767" }, { "cve": "CVE-2024-50379", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50379", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-50379" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" } ], "product_status": { "known_affected": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-53677", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53677", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-53677" }, { "cve": "CVE-2024-54677", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54677", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-54677" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "product_status": { "known_affected": [ "CSAFPID-816790" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816790" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-21542", "product_status": { "known_affected": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21542", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2025-21542" }, { "cve": "CVE-2025-21544", "product_status": { "known_affected": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21544", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2025-21544" }, { "cve": "CVE-2025-21554", "product_status": { "known_affected": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386" ] } ], "title": "CVE-2025-21554" } ] }
ncsc-2025-0124
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die vari\u00ebren van 4.3 tot 9.8, wat wijst op significante risico\u0027s voor de beschikbaarheid en vertrouwelijkheid van de systemen.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)", "title": "CWE-44" }, { "category": "general", "text": "Use of Incorrectly-Resolved Name or Reference", "title": "CWE-706" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "general", "text": "Improper Isolation or Compartmentalization", "title": "CWE-653" }, { "category": "general", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" }, { "category": "general", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "general", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "Missing Report of Error Condition", "title": "CWE-392" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Incorrect Implementation of Authentication Algorithm", "title": "CWE-303" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)", "title": "CWE-917" }, { "category": "general", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Divide By Zero", "title": "CWE-369" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2025-04-16T08:39:55.217751Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0124", "initial_release_date": "2025-04-16T08:39:55.217751Z", "revision_history": [ { "date": "2025-04-16T08:39:55.217751Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.1", "product": { "name": "vers:unknown/24.2.1", "product_id": "CSAFPID-1838578" } }, { "category": "product_version_range", "name": "vers:unknown/24.2.0", "product": { "name": "vers:unknown/24.2.0", "product_id": "CSAFPID-1838586" } } ], "category": "product_name", "name": "Communications Cloud Native Core Binding Support Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2", "product": { "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2", "product_id": "CSAFPID-1838591" } } ], "category": "product_name", "name": "Communications Cloud Native Core Policy" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.1", "product": { "name": "vers:unknown/24.2.1", "product_id": "CSAFPID-1838592" } } ], "category": "product_name", "name": "Communications Cloud Native Core Console" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.0", "product": { "name": "vers:unknown/24.2.0", "product_id": "CSAFPID-1838572" } }, { "category": "product_version_range", "name": "vers:unknown/24.2.1", "product": { "name": "vers:unknown/24.2.1", "product_id": "CSAFPID-1838581" } }, { "category": "product_version_range", "name": "vers:unknown/24.2.2", "product": { "name": "vers:unknown/24.2.2", "product_id": "CSAFPID-1838584" } } ], "category": "product_name", "name": "Communications Cloud Native Core Security Edge Protection Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=6.0|\u003c=6.1", "product": { "name": "vers:unknown/\u003e=6.0|\u003c=6.1", "product_id": "CSAFPID-2698355" } } ], "category": "product_name", "name": "Communications Unified Assurance" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.3.0", "product": { "name": "vers:unknown/24.3.0", "product_id": "CSAFPID-2698333" } } ], "category": "product_name", "name": "Management Cloud Engine" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.0", "product": { "name": "vers:unknown/24.2.0", "product_id": "CSAFPID-2698334" } } ], "category": "product_name", "name": "Communications Cloud Native Core Network Data Analytics Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.5", "product": { "name": "vers:unknown/24.2.5", "product_id": "CSAFPID-2698374" } } ], "category": "product_name", "name": "Communications Cloud Native Core Network Function Cloud Native Environment" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/9.0.0", "product": { "name": "vers:unknown/9.0.0", "product_id": "CSAFPID-1234193" } }, { "category": "product_version_range", "name": "vers:unknown/9.0.1", "product": { "name": "vers:unknown/9.0.1", "product_id": "CSAFPID-1234261" } }, { "category": "product_version_range", "name": "vers:unknown/9.0.2", "product": { "name": "vers:unknown/9.0.2", "product_id": "CSAFPID-2698362" } }, { "category": "product_version_range", "name": "vers:unknown/9.0.3", "product": { "name": "vers:unknown/9.0.3", "product_id": "CSAFPID-2698358" } }, { "category": "product_version_range", "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2698372" } } ], "category": "product_name", "name": "Communications Element Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/15.0.0.0.0", "product": { "name": "vers:unknown/15.0.0.0.0", "product_id": "CSAFPID-1837923" } } ], "category": "product_name", "name": "Communications Policy Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2698373" } } ], "category": "product_name", "name": "Communications Session Report Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/9.1.1.9", "product": { "name": "vers:unknown/9.1.1.9", "product_id": "CSAFPID-2698357" } } ], "category": "product_name", "name": "SD-WAN Edge" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.3", "product": { "name": "vers:unknown/24.2.3", "product_id": "CSAFPID-1838579" } }, { "category": "product_version_range", "name": "vers:unknown/24.3.0", "product": { "name": "vers:unknown/24.3.0", "product_id": "CSAFPID-1838582" } } ], "category": "product_name", "name": "Communications Cloud Native Core Unified Data Repository" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.0", "product": { "name": "vers:unknown/10.0.0", "product_id": "CSAFPID-2698381" } }, { "category": "product_version_range", "name": "vers:unknown/9.2.0", "product": { "name": "vers:unknown/9.2.0", "product_id": "CSAFPID-1207518" } }, { "category": "product_version_range", "name": "vers:unknown/9.3.0", "product": { "name": "vers:unknown/9.3.0", "product_id": "CSAFPID-1207704" } } ], "category": "product_name", "name": "Communications Session Border Controller" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/4.1.0", "product": { "name": "vers:unknown/4.1.0", "product_id": "CSAFPID-1207607" } }, { "category": "product_version_range", "name": "vers:unknown/4.2.0", "product": { "name": "vers:unknown/4.2.0", "product_id": "CSAFPID-1207752" } } ], "category": "product_name", "name": "Enterprise Communications Broker" } ], "category": "product_family", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839911", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839908", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product": { "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product_id": "CSAFPID-2698963", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Binding Support Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2698973", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.4", "product": { "name": "vers:oracle/24.2.4", "product_id": "CSAFPID-2699085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839941", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core DBTier" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product": { "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product_id": "CSAFPID-1839907", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4", "product": { "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4", "product_id": "CSAFPID-2698965", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4", "product": { "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4", "product_id": "CSAFPID-2698944", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Policy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839952", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-2699038", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Certificate Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839951", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-2699059", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Console" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-1839919", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2698957", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Repository Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.0", "product": { "name": "vers:oracle/23.4.0", "product_id": "CSAFPID-1839924", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839910", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-1839894", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2698958", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-2699094", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839934", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2699086", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839935", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/25.1.100", "product": { "name": "vers:oracle/25.1.100", "product_id": "CSAFPID-2699073", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Service Communication Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/46.6", "product": { "name": "vers:oracle/46.6", "product_id": "CSAFPID-2698993", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications EAGLE Element Management System" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/5.1", "product": { "name": "vers:oracle/5.1", "product_id": "CSAFPID-1839893", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/5.2", "product": { "name": "vers:oracle/5.2", "product_id": "CSAFPID-1839895", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Operations Monitor" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.11", "product": { "name": "vers:oracle/12.11", "product_id": "CSAFPID-1839890", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.0", "product": { "name": "vers:oracle/14.0", "product_id": "CSAFPID-1839891", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.0.0", "product": { "name": "vers:oracle/14.0.0", "product_id": "CSAFPID-2699072", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0", "product": { "name": "vers:oracle/15.0", "product_id": "CSAFPID-1839961", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.0", "product": { "name": "vers:oracle/15.0.0", "product_id": "CSAFPID-2699023", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1", "product": { "name": "vers:oracle/15.0.1", "product_id": "CSAFPID-2699025", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.2", "product": { "name": "vers:oracle/15.0.2", "product_id": "CSAFPID-2699024", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications User Data Repository" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.0.0.0", "product": { "name": "vers:oracle/9.0.0.0", "product_id": "CSAFPID-2698999", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Diameter Signaling Router" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-2698996", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Management Cloud Engine" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-2699007", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Data Analytics Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839868", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.5", "product": { "name": "vers:oracle/24.2.5", "product_id": "CSAFPID-2699029", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839869", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.0.0", "product": { "name": "vers:oracle/9.0.0", "product_id": "CSAFPID-2699013", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.1", "product": { "name": "vers:oracle/9.0.1", "product_id": "CSAFPID-2699012", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.2", "product": { "name": "vers:oracle/9.0.2", "product_id": "CSAFPID-2699016", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.3", "product": { "name": "vers:oracle/9.0.3", "product_id": "CSAFPID-2699015", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2699098", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Element Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-1839960", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Policy Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.0.0", "product": { "name": "vers:oracle/9.0.0", "product_id": "CSAFPID-2699093", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.1", "product": { "name": "vers:oracle/9.0.1", "product_id": "CSAFPID-2699092", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.2", "product": { "name": "vers:oracle/9.0.2", "product_id": "CSAFPID-2699091", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.3", "product": { "name": "vers:oracle/9.0.3", "product_id": "CSAFPID-2699090", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2699124", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Session Report Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.1.1.9", "product": { "name": "vers:oracle/9.1.1.9", "product_id": "CSAFPID-2698959", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle SD-WAN Edge" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/22.4.0", "product": { "name": "vers:oracle/22.4.0", "product_id": "CSAFPID-2699181", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/23.4.4", "product": { "name": "vers:oracle/23.4.4", "product_id": "CSAFPID-1839930", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.1.1", "product": { "name": "vers:oracle/24.1.1", "product_id": "CSAFPID-1839933", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-1839931", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-1839963", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839932", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/25.1.100", "product": { "name": "vers:oracle/25.1.100", "product_id": "CSAFPID-2698956", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0", "product": { "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0", "product_id": "CSAFPID-2699180", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Unified Data Repository" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/10.0.0", "product": { "name": "vers:oracle/10.0.0", "product_id": "CSAFPID-2699083", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.2.0", "product": { "name": "vers:oracle/9.2.0", "product_id": "CSAFPID-1839887", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.3.0", "product": { "name": "vers:oracle/9.3.0", "product_id": "CSAFPID-1839889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Session Border Controller" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/4.1.0", "product": { "name": "vers:oracle/4.1.0", "product_id": "CSAFPID-1839888", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/4.2.0", "product": { "name": "vers:oracle/4.2.0", "product_id": "CSAFPID-1839886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Enterprise Communications Broker" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.1.0", "product": { "name": "vers:oracle/24.1.0", "product_id": "CSAFPID-1839925", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1840027", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-2699041", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0", "product": { "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0", "product_id": "CSAFPID-2698961", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Network Analytics Data Director" } ], "category": "product_family", "name": "Oracle Communications" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1", "product_id": "CSAFPID-1145869" } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3", "product_id": "CSAFPID-1145271", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5", "product_id": "CSAFPID-1173947", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Binding Support Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2", "product_id": "CSAFPID-1145868" } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4", "product_id": "CSAFPID-1145270", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6", "product_id": "CSAFPID-1173946", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Policy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.3", "product": { "name": "vers:oracle/23.4.3", "product_id": "CSAFPID-1173942", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1173945", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Certificate Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.2", "product": { "name": "vers:oracle/23.4.2", "product_id": "CSAFPID-1173940", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1173941", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Console" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.4", "product": { "name": "vers:oracle/23.4.4", "product_id": "CSAFPID-1173965", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1173967", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Repository Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.2", "product": { "name": "vers:oracle/23.4.2", "product_id": "CSAFPID-1173943", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1173944", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.0", "product": { "name": "vers:oracle/23.4.0", "product_id": "CSAFPID-1145265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.1.0", "product": { "name": "vers:oracle/24.1.0", "product_id": "CSAFPID-1145273", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1174046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Service Communication Proxy" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/7.3.6", "product": { "name": "vers:oracle/7.3.6", "product_id": "CSAFPID-2699077", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.4.0", "product": { "name": "vers:oracle/7.4.0", "product_id": "CSAFPID-2699075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.0", "product": { "name": "vers:oracle/7.5.0", "product_id": "CSAFPID-2699076", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Network Integrity" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/6.0", "product": { "name": "vers:oracle/6.0", "product_id": "CSAFPID-2699027", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5", "product": { "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5", "product_id": "CSAFPID-1839852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5", "product": { "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5", "product_id": "CSAFPID-1840033", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=6.0|\u003c=6.1", "product": { "name": "vers:oracle/\u003e=6.0|\u003c=6.1", "product_id": "CSAFPID-2698955", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Unified Assurance" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.0.0.8.0", "product": { "name": "vers:oracle/12.0.0.8.0", "product_id": "CSAFPID-2699001", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-2699084", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1.0.0", "product": { "name": "vers:oracle/15.0.1.0.0", "product_id": "CSAFPID-2699079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product": { "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product_id": "CSAFPID-2699058", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8", "product": { "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8", "product_id": "CSAFPID-1839957", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0", "product": { "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0", "product_id": "CSAFPID-2699000", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1", "product": { "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1", "product_id": "CSAFPID-1839953", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Billing and Revenue Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.1.0.26.0", "product": { "name": "vers:oracle/8.1.0.26.0", "product_id": "CSAFPID-2698964", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Messaging Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/6.3.1", "product": { "name": "vers:oracle/6.3.1", "product_id": "CSAFPID-2698991", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications MetaSolv Solution" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.0.6.0.0", "product": { "name": "vers:oracle/12.0.6.0.0", "product_id": "CSAFPID-2699127", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-2699126", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1.0.0", "product": { "name": "vers:oracle/15.0.1.0.0", "product_id": "CSAFPID-2699128", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Network Charging and Control" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/7.4.0", "product": { "name": "vers:oracle/7.4.0", "product_id": "CSAFPID-1839980", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.0", "product": { "name": "vers:oracle/7.5.0", "product_id": "CSAFPID-1840004", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.4.1", "product": { "name": "vers:oracle/7.4.1", "product_id": "CSAFPID-1839981", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Order and Service Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-2699056", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1.0.0", "product": { "name": "vers:oracle/15.0.1.0.0", "product_id": "CSAFPID-2699063", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product": { "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product_id": "CSAFPID-2699060", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Pricing Design Center" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.0.0.3", "product": { "name": "vers:oracle/8.0.0.3", "product_id": "CSAFPID-1839921", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.0.0.4.0", "product": { "name": "vers:oracle/8.0.0.4.0", "product_id": "CSAFPID-2698975", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.0.1", "product": { "name": "vers:oracle/8.1.0.1", "product_id": "CSAFPID-1839922", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.0.2.0", "product": { "name": "vers:oracle/8.1.0.2.0", "product_id": "CSAFPID-2698974", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Service Catalog and Design" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/7.4.1", "product": { "name": "vers:oracle/7.4.1", "product_id": "CSAFPID-1839978", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.4.2", "product": { "name": "vers:oracle/7.4.2", "product_id": "CSAFPID-1839979", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.0", "product": { "name": "vers:oracle/7.5.0", "product_id": "CSAFPID-2699035", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.1", "product": { "name": "vers:oracle/7.5.1", "product_id": "CSAFPID-1839983", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.6.0", "product": { "name": "vers:oracle/7.6.0", "product_id": "CSAFPID-1840005", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.7.0", "product": { "name": "vers:oracle/7.7.0", "product_id": "CSAFPID-2699034", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2", "product": { "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2", "product_id": "CSAFPID-2699036", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1", "product": { "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1", "product_id": "CSAFPID-2699096", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Unified Inventory Management" } ], "category": "product_family", "name": "Oracle Communications Applications" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.0", "product": { "name": "vers:oracle/23.4.0", "product_id": "CSAFPID-1145246", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.1.0", "product": { "name": "vers:oracle/24.1.0", "product_id": "CSAFPID-1145247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:semver/7.4.0", "product": { "name": "vers:semver/7.4.0", "product_id": "CSAFPID-2698653" } }, { "category": "product_version_range", "name": "vers:semver/7.4.1", "product": { "name": "vers:semver/7.4.1", "product_id": "CSAFPID-2698654" } }, { "category": "product_version_range", "name": "vers:semver/7.5.0", "product": { "name": "vers:semver/7.5.0", "product_id": "CSAFPID-2698655" } } ], "category": "product_name", "name": "Oracle Communications Order and Service Management" } ], "category": "vendor", "name": "Oracle Corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5388", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5388", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-5388" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-49582", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49582", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-49582" }, { "cve": "CVE-2023-51074", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-51074" }, { "cve": "CVE-2024-1135", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-1135" }, { "cve": "CVE-2024-4227", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4227", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-4227" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6763", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "other", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json" } ], "title": "CVE-2024-6763" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-11053", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-11053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-11053" }, { "cve": "CVE-2024-12797", "cwe": { "id": "CWE-392", "name": "Missing Report of Error Condition" }, "notes": [ { "category": "other", "text": "Missing Report of Error Condition", "title": "CWE-392" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-12797", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-12797" }, { "cve": "CVE-2024-12798", "cwe": { "id": "CWE-917", "name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)", "title": "CWE-917" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-12798", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-12798" }, { "cve": "CVE-2024-21538", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21538", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-21538" }, { "cve": "CVE-2024-25638", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25638", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-25638" }, { "cve": "CVE-2024-28168", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28168", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-28168" }, { "cve": "CVE-2024-28219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-28219" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28834", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-31141", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31141", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-31141" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-35195", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "other", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-35195" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38827", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38827", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-38827" }, { "cve": "CVE-2024-40896", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40896", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-40896" }, { "cve": "CVE-2024-43044", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-43044" }, { "cve": "CVE-2024-43709", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43709", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json" } ], "title": "CVE-2024-43709" }, { "cve": "CVE-2024-43796", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43796", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-43796" }, { "cve": "CVE-2024-47072", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-49767", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-49767", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-49767" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52046", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-52046", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-52046" }, { "cve": "CVE-2024-52303", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-52303", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-52303" }, { "cve": "CVE-2024-53122", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Divide By Zero", "title": "CWE-369" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53122", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-53122" }, { "cve": "CVE-2024-56128", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "notes": [ { "category": "other", "text": "Incorrect Implementation of Authentication Algorithm", "title": "CWE-303" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-56128" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2024-57699", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-57699", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-57699" }, { "cve": "CVE-2025-1974", "cwe": { "id": "CWE-653", "name": "Improper Isolation or Compartmentalization" }, "notes": [ { "category": "other", "text": "Improper Isolation or Compartmentalization", "title": "CWE-653" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-1974", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-1974" }, { "cve": "CVE-2025-23084", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23084", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-23084" }, { "cve": "CVE-2025-23184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json" } ], "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24813", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)", "title": "CWE-44" }, { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Use of Incorrectly-Resolved Name or Reference", "title": "CWE-706" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24813", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-24813" }, { "cve": "CVE-2025-24928", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24928", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-24928" }, { "cve": "CVE-2025-24970", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-24970" }, { "cve": "CVE-2025-27516", "cwe": { "id": "CWE-1336", "name": "Improper Neutralization of Special Elements Used in a Template Engine" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27516", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json" } ], "title": "CVE-2025-27516" }, { "cve": "CVE-2025-27789", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27789", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-27789" }, { "cve": "CVE-2025-30729", "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30729", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-30729" }, { "cve": "CVE-2025-31721", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31721", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-31721" } ] }
ncsc-2025-0119
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "SAP heeft kwetsbaarheden verholpen in verschillende producten, waaronder SAP Financial Consolidation, SAP Landscape Transformation, SAP NetWeaver Application Server ABAP, SAP Commerce Cloud, SAP ERP BW, SAP BusinessObjects Business Intelligence Platform, SAP KMC WPC, SAP Solution Manager, SAP S4CORE, en SAP CRM.", "title": "Feiten" }, { "category": "description", "text": "De uitgebrachte paches bevatten een aantal kritieke kwetsbaarheden met de kenmerken CVE-2025-30016, CVE-2025-31330 en CVE-2025-27429.\n\nDe kwetsbaarheid met kenmerk CVE-2025-30016 is een kritieke authenticatie-bypass in SAP Financial Consolidation, die ongeauthenticeerde aanvallers toegang geeft tot het Admin-account. \n\nSAP Landscape Transformation heeft een kwetsbaarheid met kenmerk CVE-2025-31330, die het mogelijk maakt voor aanvallers met gebruikersprivileges om willekeurige ABAP-code in te voegen.\n\nDe kwetsbaarheid met kenmerk CVE-2025-27429 in SAP S/4HANA (Private Cloud) stelt een aanvaller met gebruikersprivileges in staat om willekeurige ABAP-code in de RFC-functiemodule te injecteren en autorisatiecontroles te omzeilen, waardoor de vertrouwelijkheid, integriteit en beschikbaarheid van het systeem in gevaar komen.\n\n\nSAP NetWeaver Application Server ABAP heeft een Mixed Dynamic RFC Destination-kwetsbaarheid die kan leiden tot blootstelling van gevoelige inloggegevens. Daarnaast zijn er kwetsbaarheden in SAP Commerce Cloud die de vertrouwelijkheid en integriteit van gegevens in gevaar kunnen brengen. De kwetsbaarheden in SAP ERP BW en SAP BusinessObjects kunnen leiden tot ongeautoriseerde uitvoering van commando\u0027s en wijziging van bestanden. De directory traversal-kwetsbaarheden in SAP Capital Yield Tax Management en SAP Solution Manager stellen aanvallers in staat om gevoelige informatie te verkrijgen. De SSRF-kwetsbaarheid in SAP CRM en SAP S/4HANA kan de vertrouwelijkheid van interne netwerkbronnen in gevaar brengen. \n\n\n**UPDATE 25/04/2025**\nSAP heeft een update uitgebracht op de advisory van eerder deze maand. De belangrijkste aanpassing is de toevoeging van **CVE-2025-31324**. Dit is een kritieke kwetsbaarheid waarbij de Metadata Uploader geen correcte autorisatiecontrole toepast. Hierdoor kan een niet-geauthenticeerde aanvaller kwaadaardige uitvoerbare bestanden uploaden naar de server.\n\n**UPDATE 28/04/2025**\nHet NCSC ontvangt meldingen dat de kwetsbaarheid met kenmerk CVE-2025-31324 actief wordt misbruikt.\nDe getroffen Metadata Uploader is onderdeel van Visual Composer. Dit product, bedoeld om zonder het schrijven van programmacode user-interfaces te bouwen, wordt al sinds 2015 niet meer ondersteund. Het gebruik ervan om interfaces te bouwen wordt daarom afgeraden. Ook is het goed gebruik een dergelijk ontwerpsoftware niet publiek toegankelijk te hebben, maar te hosten in een separate ontwikkelomgeving.\nIn het geval van Visual Composer kan de toegang worden beperkt door de applicatia-alias `developmentserver` uit te schakelen en middels firewall rules de toegang tot de development-server applicatie-url te blokkeren.\n\n**UPDATE 30/04/2025**\nIn de eerdere update van dit beveiligingsadvies op 28/04/2025 heeft het NCSC gemeld dat de kwetsbaarheid met het kenmerk CVE-2025-31324 actief wordt misbruikt. Een onderdeel van het misbruik is dat kwaadwillenden webshells plaatsen. Na nader onderzoek door het NCSC en op basis van ontvangen meldingen, is ook waargenomen dat deze webshells online te koop wordt aangeboden. Dit vergroot de kans op misbruik aanzienlijk. Het NCSC heeft daarom besloten om dit beveiligingsadvies naar H/H te verhogen.", "title": "Interpretaties" }, { "category": "description", "text": "SAP heeft patches uitgebracht om de kwetsbaarheden in de genoemde producten te verhelpen.\n\nOok heeft SAP voor de kwetsbaarheid met kenmerk CVE-2025-31324 een noodpatch uitgebracht om deze te verhelpen. Het NCSC adviseert om naast de reguliere updates vooral deze noodpatch ook in te zetten.\n\n**UPDATE 30/04/2025**\nHet NCSC adviseert met klem om de beschikbaar gestelde beveiligingsupdates te installeren en uw systeem op aanwezigheid van webshells te controleren. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "high", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "general", "text": "Insecure Inherited Permissions", "title": "CWE-277" }, { "category": "general", "text": "Storage of Sensitive Data in a Mechanism without Access Control", "title": "CWE-921" }, { "category": "general", "text": "External Control of Assumed-Immutable Web Parameter", "title": "CWE-472" }, { "category": "general", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "general", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2025.html" }, { "category": "external", "summary": "Reference - cisagov; cveprojectv5; nvd", "url": "https://me.sap.com/notes/3594142" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/" } ], "title": "Kwetsbaarheden verholpen in SAP-producten", "tracking": { "current_release_date": "2025-04-30T13:12:27.070565Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0119", "initial_release_date": "2025-04-09T09:12:05.705017Z", "revision_history": [ { "date": "2025-04-09T09:12:05.705017Z", "number": "1.0.0", "summary": "Initiele versie" }, { "date": "2025-04-25T12:10:29.929217Z", "number": "1.0.1", "summary": "SAP heeft een update op de advisorie van eerder deze maand" }, { "date": "2025-04-28T09:35:57.213875Z", "number": "1.0.2", "summary": "Meldingen van misbruik van CVE-2025-31324." }, { "date": "2025-04-30T13:12:27.070565Z", "number": "1.0.3", "summary": "New revision" } ], "status": "final", "version": "1.0.3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0", "product": { "name": "vers:unknown/10.0", "product_id": "CSAFPID-426681", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:sap_businessobjects_financial_consolidation:10.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/10.0.0.1933", "product": { "name": "vers:unknown/10.0.0.1933", "product_id": "CSAFPID-367586" } }, { "category": "product_version_range", "name": "vers:unknown/10.1", "product": { "name": "vers:unknown/10.1", "product_id": "CSAFPID-426682", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:sap_businessobjects_financial_consolidation:10.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-336862" } } ], "category": "product_name", "name": "BusinessObjects Financial Consolidation" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/2.00", "product": { "name": "vers:unknown/2.00", "product_id": "CSAFPID-426483", "product_identification_helper": { "cpe": "cpe:2.3:a:sap_se:sap_erp_financials_information_system:2.00:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "ERP Financials Information System" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/6.0", "product": { "name": "vers:unknown/6.0", "product_id": "CSAFPID-447161" } }, { "category": "product_version_range", "name": "vers:unknown/6.03", "product": { "name": "vers:unknown/6.03", "product_id": "CSAFPID-447167" } }, { "category": "product_version_range", "name": "vers:unknown/6.04", "product": { "name": "vers:unknown/6.04", "product_id": "CSAFPID-447158" } }, { "category": "product_version_range", "name": "vers:unknown/6.05", "product": { "name": "vers:unknown/6.05", "product_id": "CSAFPID-447155" } }, { "category": "product_version_range", "name": "vers:unknown/6.06", "product": { "name": "vers:unknown/6.06", "product_id": "CSAFPID-447160" } }, { "category": "product_version_range", "name": "vers:unknown/6.16", "product": { "name": "vers:unknown/6.16", "product_id": "CSAFPID-447163" } }, { "category": "product_version_range", "name": "vers:unknown/6.17", "product": { "name": "vers:unknown/6.17", "product_id": "CSAFPID-447165" } }, { "category": "product_version_range", "name": "vers:unknown/6.18", "product": { "name": "vers:unknown/6.18", "product_id": "CSAFPID-447156" } }, { "category": "product_version_range", "name": "vers:unknown/8.0", "product": { "name": "vers:unknown/8.0", "product_id": "CSAFPID-447164" } } ], "category": "product_name", "name": "Enterprise Extension Financial Services" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-710027" } }, { "category": "product_version_range", "name": "vers:unknown/6.05", "product": { "name": "vers:unknown/6.05", "product_id": "CSAFPID-426703" } }, { "category": "product_version_range", "name": "vers:unknown/6.06", "product": { "name": "vers:unknown/6.06", "product_id": "CSAFPID-426706" } }, { "category": "product_version_range", "name": "vers:unknown/6.16", "product": { "name": "vers:unknown/6.16", "product_id": "CSAFPID-426707" } }, { "category": "product_version_range", "name": "vers:unknown/6.17", "product": { "name": "vers:unknown/6.17", "product_id": "CSAFPID-426708" } }, { "category": "product_version_range", "name": "vers:unknown/6.18", "product": { "name": "vers:unknown/6.18", "product_id": "CSAFPID-426704" } }, { "category": "product_version_range", "name": "vers:unknown/8.0", "product": { "name": "vers:unknown/8.0", "product_id": "CSAFPID-426705" } } ], "category": "product_name", "name": "Enterprise Financial Services" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0", "product": { "name": "vers:unknown/10.0", "product_id": "CSAFPID-447141" } }, { "category": "product_version_range", "name": "vers:unknown/10.1", "product": { "name": "vers:unknown/10.1", "product_id": "CSAFPID-447140" } }, { "category": "product_version_range", "name": "vers:unknown/1010", "product": { "name": "vers:unknown/1010", "product_id": "CSAFPID-847883", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:financial_consolidation:1010:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Financial Consolidation" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.1", "product": { "name": "vers:unknown/10.1", "product_id": "CSAFPID-426837" } } ], "category": "product_name", "name": "Financial Consolidation Cube Designer" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-1176052" } }, { "category": "product_version_range", "name": "vers:unknown/unknown", "product": { "name": "vers:unknown/unknown", "product_id": "CSAFPID-1333259" } } ], "category": "product_name", "name": "NetWeaver" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/7.50", "product": { "name": "vers:unknown/7.50", "product_id": "CSAFPID-2351307" } } ], "category": "product_name", "name": "NetWeaver (SAP Enterprise Portal)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/700", "product": { "name": "vers:unknown/700", "product_id": "CSAFPID-2538790" } }, { "category": "product_version_range", "name": "vers:unknown/701", "product": { "name": "vers:unknown/701", "product_id": "CSAFPID-2538791" } }, { "category": "product_version_range", "name": "vers:unknown/702", "product": { "name": "vers:unknown/702", "product_id": "CSAFPID-2538792" } }, { "category": "product_version_range", "name": "vers:unknown/731", "product": { "name": "vers:unknown/731", "product_id": "CSAFPID-2538793" } }, { "category": "product_version_range", "name": "vers:unknown/740", "product": { "name": "vers:unknown/740", "product_id": "CSAFPID-2538794" } }, { "category": "product_version_range", "name": "vers:unknown/750", "product": { "name": "vers:unknown/750", "product_id": "CSAFPID-2538799" } }, { "category": "product_version_range", "name": "vers:unknown/751", "product": { "name": "vers:unknown/751", "product_id": "CSAFPID-2538800" } }, { "category": "product_version_range", "name": "vers:unknown/752", "product": { "name": "vers:unknown/752", "product_id": "CSAFPID-2538801" } }, { "category": "product_version_range", "name": "vers:unknown/753", "product": { "name": "vers:unknown/753", "product_id": "CSAFPID-2538802" } }, { "category": "product_version_range", "name": "vers:unknown/754", "product": { "name": "vers:unknown/754", "product_id": "CSAFPID-2538803" } }, { "category": "product_version_range", "name": "vers:unknown/755", "product": { "name": "vers:unknown/755", "product_id": "CSAFPID-2538804" } }, { "category": "product_version_range", "name": "vers:unknown/756", "product": { "name": "vers:unknown/756", "product_id": "CSAFPID-2538805" } }, { "category": "product_version_range", "name": "vers:unknown/757", "product": { "name": "vers:unknown/757", "product_id": "CSAFPID-2538806" } } ], "category": "product_name", "name": "NetWeaver AS ABAP (BSP Framework)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/700", "product": { "name": "vers:unknown/700", "product_id": "CSAFPID-2538773" } }, { "category": "product_version_range", "name": "vers:unknown/701", "product": { "name": "vers:unknown/701", "product_id": "CSAFPID-2538774" } }, { "category": "product_version_range", "name": "vers:unknown/702", "product": { "name": "vers:unknown/702", "product_id": "CSAFPID-2538775" } }, { "category": "product_version_range", "name": "vers:unknown/731", "product": { "name": "vers:unknown/731", "product_id": "CSAFPID-2538776" } }, { "category": "product_version_range", "name": "vers:unknown/740", "product": { "name": "vers:unknown/740", "product_id": "CSAFPID-2538777" } }, { "category": "product_version_range", "name": "vers:unknown/750", "product": { "name": "vers:unknown/750", "product_id": "CSAFPID-2538778" } }, { "category": "product_version_range", "name": "vers:unknown/751", "product": { "name": "vers:unknown/751", "product_id": "CSAFPID-2538779" } }, { "category": "product_version_range", "name": "vers:unknown/752", "product": { "name": "vers:unknown/752", "product_id": "CSAFPID-2538780" } }, { "category": "product_version_range", "name": "vers:unknown/75c", "product": { "name": "vers:unknown/75c", "product_id": "CSAFPID-2538781" } } ], "category": "product_name", "name": "NetWeaver AS ABAP (Business Server Pages application)" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-1307450" } }, { "category": "product_version_range", "name": "vers:unknown/1808", "product": { "name": "vers:unknown/1808", "product_id": "CSAFPID-1297130" } }, { "category": "product_version_range", "name": "vers:unknown/1811", "product": { "name": "vers:unknown/1811", "product_id": "CSAFPID-1297107" } }, { "category": "product_version_range", "name": "vers:unknown/1905", "product": { "name": "vers:unknown/1905", "product_id": "CSAFPID-1230533" } }, { "category": "product_version_range", "name": "vers:unknown/2001 zh", "product": { "name": "vers:unknown/2001 zh", "product_id": "CSAFPID-1921506" } }, { "category": "product_version_range", "name": "vers:unknown/2005", "product": { "name": "vers:unknown/2005", "product_id": "CSAFPID-1230555" } }, { "category": "product_version_range", "name": "vers:unknown/2011", "product": { "name": "vers:unknown/2011", "product_id": "CSAFPID-1230719" } }, { "category": "product_version_range", "name": "vers:unknown/2105", "product": { "name": "vers:unknown/2105", "product_id": "CSAFPID-1230702" } }, { "category": "product_version_range", "name": "vers:unknown/2205", "product": { "name": "vers:unknown/2205", "product_id": "CSAFPID-1304671" } }, { "category": "product_version_range", "name": "vers:unknown/2211", "product": { "name": "vers:unknown/2211", "product_id": "CSAFPID-1921487" } }, { "category": "product_version_range", "name": "vers:unknown/6.7", "product": { "name": "vers:unknown/6.7", "product_id": "CSAFPID-1297186" } } ], "category": "product_name", "name": "Commerce" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/2205 hy_com", "product": { "name": "vers:unknown/2205 hy_com", "product_id": "CSAFPID-2473272" } }, { "category": "product_version_range", "name": "vers:unknown/2211", "product": { "name": "vers:unknown/2211", "product_id": "CSAFPID-2473273" } }, { "category": "product_version_range", "name": "vers:unknown/none", "product": { "name": "vers:unknown/none", "product_id": "CSAFPID-1306891" } } ], "category": "product_name", "name": "Commerce Cloud" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-1306888" } } ], "category": "product_name", "name": "Landscape Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/7.0", "product": { "name": "vers:unknown/7.0", "product_id": "CSAFPID-2352521" } }, { "category": "product_version_range", "name": "vers:unknown/7.10", "product": { "name": "vers:unknown/7.10", "product_id": "CSAFPID-2352520" } }, { "category": "product_version_range", "name": "vers:unknown/7.20", "product": { "name": "vers:unknown/7.20", "product_id": "CSAFPID-1304029" } }, { "category": "product_version_range", "name": "vers:unknown/7.40", "product": { "name": "vers:unknown/7.40", "product_id": "CSAFPID-2352519" } }, { "category": "product_version_range", "name": "vers:unknown/720", "product": { "name": "vers:unknown/720", "product_id": "CSAFPID-2539577" } }, { "category": "product_version_range", "name": "vers:unknown/740", "product": { "name": "vers:unknown/740", "product_id": "CSAFPID-2352518" } } ], "category": "product_name", "name": "Solution Manager" } ], "category": "product_family", "name": "SAP" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/com_cloud 2211", "product": { "name": "vers:unknown/com_cloud 2211", "product_id": "CSAFPID-1988023" } }, { "category": "product_version_range", "name": "vers:unknown/hy_com 2205", "product": { "name": "vers:unknown/hy_com 2205", "product_id": "CSAFPID-1988024" } } ], "category": "product_name", "name": "Commerce" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-1175835" } }, { "category": "product_version_range", "name": "vers:unknown/2211", "product": { "name": "vers:unknown/2211", "product_id": "CSAFPID-2632442" } }, { "category": "product_version_range", "name": "vers:unknown/com_cloud 2211", "product": { "name": "vers:unknown/com_cloud 2211", "product_id": "CSAFPID-2632443" } }, { "category": "product_version_range", "name": "vers:unknown/com_cloud 2211|hy_com 2205", "product": { "name": "vers:unknown/com_cloud 2211|hy_com 2205", "product_id": "CSAFPID-1425816" } }, { "category": "product_version_range", "name": "vers:unknown/hy_com 2205", "product": { "name": "vers:unknown/hy_com 2205", "product_id": "CSAFPID-2632444" } }, { "category": "product_version_range", "name": "vers:unknown/unknown", "product": { "name": "vers:unknown/unknown", "product_id": "CSAFPID-1332128" } } ], "category": "product_name", "name": "Commerce Cloud" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/1808", "product": { "name": "vers:unknown/1808", "product_id": "CSAFPID-605062" } }, { "category": "product_version_range", "name": "vers:unknown/1811", "product": { "name": "vers:unknown/1811", "product_id": "CSAFPID-605061" } }, { "category": "product_version_range", "name": "vers:unknown/1905", "product": { "name": "vers:unknown/1905", "product_id": "CSAFPID-605064" } } ], "category": "product_name", "name": "Commerce Data Hub" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/7.00", "product": { "name": "vers:unknown/7.00", "product_id": "CSAFPID-345584" } }, { "category": "product_version_range", "name": "vers:unknown/7.01", "product": { "name": "vers:unknown/7.01", "product_id": "CSAFPID-345586" } }, { "category": "product_version_range", "name": "vers:unknown/7.02", "product": { "name": "vers:unknown/7.02", "product_id": "CSAFPID-345588" } }, { "category": "product_version_range", "name": "vers:unknown/7.10", "product": { "name": "vers:unknown/7.10", "product_id": "CSAFPID-345621" } }, { "category": "product_version_range", "name": "vers:unknown/7.11", "product": { "name": "vers:unknown/7.11", "product_id": "CSAFPID-345620" } }, { "category": "product_version_range", "name": "vers:unknown/7.30", "product": { "name": "vers:unknown/7.30", "product_id": "CSAFPID-345590" } }, { "category": "product_version_range", "name": "vers:unknown/7.31", "product": { "name": "vers:unknown/7.31", "product_id": "CSAFPID-345585" } }, { "category": "product_version_range", "name": "vers:unknown/7.40", "product": { "name": "vers:unknown/7.40", "product_id": "CSAFPID-345591" } }, { "category": "product_version_range", "name": "vers:unknown/7.50", "product": { "name": "vers:unknown/7.50", "product_id": "CSAFPID-345592" } }, { "category": "product_version_range", "name": "vers:unknown/7.51", "product": { "name": "vers:unknown/7.51", "product_id": "CSAFPID-345589" } }, { "category": "product_version_range", "name": "vers:unknown/7.52", "product": { "name": "vers:unknown/7.52", "product_id": "CSAFPID-345587" } }, { "category": "product_version_range", "name": "vers:unknown/7.53", "product": { "name": "vers:unknown/7.53", "product_id": "CSAFPID-426833" } } ], "category": "product_name", "name": "Business Application Software Integrated Solution" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/2.0", "product": { "name": "vers:unknown/2.0", "product_id": "CSAFPID-710118" } }, { "category": "product_version_range", "name": "vers:unknown/2011_1_710", "product": { "name": "vers:unknown/2011_1_710", "product_id": "CSAFPID-2632409" } }, { "category": "product_version_range", "name": "vers:unknown/2011_1_730", "product": { "name": "vers:unknown/2011_1_730", "product_id": "CSAFPID-2632410" } }, { "category": "product_version_range", "name": "vers:unknown/2011_1_731", "product": { "name": "vers:unknown/2011_1_731", "product_id": "CSAFPID-2632411" } }, { "category": "product_version_range", "name": "vers:unknown/dmis 2011_1_700", "product": { "name": "vers:unknown/dmis 2011_1_700", "product_id": "CSAFPID-2632412" } }, { "category": "product_version_range", "name": "vers:unknown/dmis_2011_1_700", "product": { "name": "vers:unknown/dmis_2011_1_700", "product_id": "CSAFPID-2633939" } } ], "category": "product_name", "name": "Landscape Transformation" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/7.10", "product": { "name": "vers:unknown/7.10", "product_id": "CSAFPID-426454" } }, { "category": "product_version_range", "name": "vers:unknown/7.20", "product": { "name": "vers:unknown/7.20", "product_id": "CSAFPID-426453" } }, { "category": "product_version_range", "name": "vers:unknown/7.30", "product": { "name": "vers:unknown/7.30", "product_id": "CSAFPID-426456" } }, { "category": "product_version_range", "name": "vers:unknown/7.31", "product": { "name": "vers:unknown/7.31", "product_id": "CSAFPID-426455" } }, { "category": "product_version_range", "name": "vers:unknown/7.40", "product": { "name": "vers:unknown/7.40", "product_id": "CSAFPID-426457" } }, { "category": "product_version_range", "name": "vers:unknown/7.5", "product": { "name": "vers:unknown/7.5", "product_id": "CSAFPID-1295436", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:netweaver_system_landscape_directory:7.5:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Netweaver System Landscape Directory" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/3.0", "product": { "name": "vers:unknown/3.0", "product_id": "CSAFPID-2118594" } } ], "category": "product_name", "name": "landscape_management" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-1176305" } }, { "category": "product_version_range", "name": "vers:unknown/720", "product": { "name": "vers:unknown/720", "product_id": "CSAFPID-2538090" } }, { "category": "product_version_range", "name": "vers:unknown/sap_basis 700", "product": { "name": "vers:unknown/sap_basis 700", "product_id": "CSAFPID-2632425" } }, { "category": "product_version_range", "name": "vers:unknown/sap_basis 701", "product": { "name": "vers:unknown/sap_basis 701", "product_id": "CSAFPID-2632426" } }, { "category": "product_version_range", "name": "vers:unknown/sap_basis 702", "product": { "name": "vers:unknown/sap_basis 702", "product_id": "CSAFPID-2632427" } }, { "category": "product_version_range", "name": "vers:unknown/sap_basis 731", "product": { "name": "vers:unknown/sap_basis 731", "product_id": "CSAFPID-2632428" } }, { "category": "product_version_range", "name": "vers:unknown/sap_basis 740", "product": { "name": "vers:unknown/sap_basis 740", "product_id": "CSAFPID-2632429" } } ], "category": "product_name", "name": "Solution Manager" } ], "category": "vendor", "name": "SAP" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/unknown", "product": { "name": "vers:unknown/unknown", "product_id": "CSAFPID-2364492", "product_identification_helper": { "cpe": "cpe:/a:atoss:staff_efficiency_suite:-" } } } ], "category": "product_name", "name": "ATOSS Staff Efficiency Suite" } ], "category": "vendor", "name": "ATOSS" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/unknown", "product": { "name": "vers:unknown/unknown", "product_id": "CSAFPID-1330296", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "product_name", "name": "Amazon Linux 2" } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c10.1.34", "product": { "name": "vers:unknown/\u003c10.1.34", "product_id": "CSAFPID-1459777" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c11.0.2", "product": { "name": "vers:unknown/\u003c11.0.2", "product_id": "CSAFPID-1459778" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c9.0.98", "product": { "name": "vers:unknown/\u003c9.0.98", "product_id": "CSAFPID-1459779" } } ], "category": "product_name", "name": "Tomcat" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=10.1.0 milestone1|\u003c=10.1.33", "product": { "name": "vers:unknown/\u003e=10.1.0 milestone1|\u003c=10.1.33", "product_id": "CSAFPID-1861039" } }, { "category": "product_version_range", "name": "vers:unknown/\u003e=11.0.0 milestone1|\u003c=11.0.1", "product": { "name": "vers:unknown/\u003e=11.0.0 milestone1|\u003c=11.0.1", "product_id": "CSAFPID-1861040" } }, { "category": "product_version_range", "name": "vers:unknown/\u003e=9.0.0 milestone1|\u003c=9.0.97", "product": { "name": "vers:unknown/\u003e=9.0.0 milestone1|\u003c=9.0.97", "product_id": "CSAFPID-1861041" } } ], "category": "product_name", "name": "Tomcat" } ], "category": "product_family", "name": "Apache" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.1.0", "product": { "name": "vers:unknown/10.1.0", "product_id": "CSAFPID-2140760" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.1", "product": { "name": "vers:unknown/10.1.1", "product_id": "CSAFPID-2140804" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.10", "product": { "name": "vers:unknown/10.1.10", "product_id": "CSAFPID-2140795" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.11", "product": { "name": "vers:unknown/10.1.11", "product_id": "CSAFPID-2140773" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.12", "product": { "name": "vers:unknown/10.1.12", "product_id": "CSAFPID-2140818" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.13", "product": { "name": "vers:unknown/10.1.13", "product_id": "CSAFPID-2140755" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.14", "product": { "name": "vers:unknown/10.1.14", "product_id": "CSAFPID-2140803" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.15", "product": { "name": "vers:unknown/10.1.15", "product_id": "CSAFPID-2140852" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.16", "product": { "name": "vers:unknown/10.1.16", "product_id": "CSAFPID-2140842" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.17", "product": { "name": "vers:unknown/10.1.17", "product_id": "CSAFPID-2140814" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.18", "product": { "name": "vers:unknown/10.1.18", "product_id": "CSAFPID-2140749" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.19", "product": { "name": "vers:unknown/10.1.19", "product_id": "CSAFPID-2140796" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.2", "product": { "name": "vers:unknown/10.1.2", "product_id": "CSAFPID-2140856" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.20", "product": { "name": "vers:unknown/10.1.20", "product_id": "CSAFPID-2140834" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.21", "product": { "name": "vers:unknown/10.1.21", "product_id": "CSAFPID-2140851" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.22", "product": { "name": "vers:unknown/10.1.22", "product_id": "CSAFPID-2140742" } }, { "category": "product_version_range", "name": "vers:unknown/10.1.23", "product": { "name": "vers:unknown/10.1.23", "product_id": "CSAFPID-2140825" } } ], "category": "product_name", "name": "tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/103", "product": { "name": "vers:unknown/103", "product_id": "CSAFPID-2631681" } }, { "category": "product_version_range", "name": "vers:unknown/104", "product": { "name": "vers:unknown/104", "product_id": "CSAFPID-2631682" } }, { "category": "product_version_range", "name": "vers:unknown/105", "product": { "name": "vers:unknown/105", "product_id": "CSAFPID-2631683" } }, { "category": "product_version_range", "name": "vers:unknown/106", "product": { "name": "vers:unknown/106", "product_id": "CSAFPID-2631684" } }, { "category": "product_version_range", "name": "vers:unknown/107", "product": { "name": "vers:unknown/107", "product_id": "CSAFPID-2631685" } }, { "category": "product_version_range", "name": "vers:unknown/108", "product": { "name": "vers:unknown/108", "product_id": "CSAFPID-2631686" } }, { "category": "product_version_range", "name": "vers:unknown/s4core102", "product": { "name": "vers:unknown/s4core102", "product_id": "CSAFPID-2631680" } } ], "category": "product_name", "name": "SAP S/4HANA (Private Cloud)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/2011_1_710", "product": { "name": "vers:unknown/2011_1_710", "product_id": "CSAFPID-2631732" } }, { "category": "product_version_range", "name": "vers:unknown/2011_1_730", "product": { "name": "vers:unknown/2011_1_730", "product_id": "CSAFPID-2631733" } }, { "category": "product_version_range", "name": "vers:unknown/2011_1_731", "product": { "name": "vers:unknown/2011_1_731", "product_id": "CSAFPID-2631734" } }, { "category": "product_version_range", "name": "vers:unknown/dmis2011_1_700", "product": { "name": "vers:unknown/dmis2011_1_700", "product_id": "CSAFPID-2631731" } } ], "category": "product_name", "name": "SAP Landscape Transformation (Analysis Platform)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/lm-sld 7.5", "product": { "name": "vers:unknown/lm-sld 7.5", "product_id": "CSAFPID-1295163" } } ], "category": "product_name", "name": "SAP NetWeaver AS Java (System Landscape Directory)" } ], "category": "vendor", "name": "SAP_SE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/*", "product": { "name": "vers:unknown/*", "product_id": "CSAFPID-735564" } }, { "category": "product_version_range", "name": "vers:unknown/3.0", "product": { "name": "vers:unknown/3.0", "product_id": "CSAFPID-446586", "product_identification_helper": { "cpe": "cpe:2.3:a:sap:landscape_management:3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/3.00", "product": { "name": "vers:unknown/3.00", "product_id": "CSAFPID-1111431" } } ], "category": "product_name", "name": "landscape_management" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/1.0", "product": { "name": "vers:unknown/1.0", "product_id": "CSAFPID-710125" } }, { "category": "product_version_range", "name": "vers:unknown/2.0", "product": { "name": "vers:unknown/2.0", "product_id": "CSAFPID-710119" } }, { "category": "product_version_range", "name": "vers:unknown/3.0", "product": { "name": "vers:unknown/3.0", "product_id": "CSAFPID-710115" } } ], "category": "product_name", "name": "landscape_transformation_replication_server" } ], "category": "vendor", "name": "sap" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-0064", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-0064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-0064" }, { "cve": "CVE-2025-23186", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23186", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23186.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-23186" }, { "cve": "CVE-2025-26653", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26653", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26653.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-26653" }, { "cve": "CVE-2025-26654", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "other", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26654", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26654.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-26654" }, { "cve": "CVE-2025-26657", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-26657", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26657.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-26657" }, { "cve": "CVE-2025-27428", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27428.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-27428" }, { "cve": "CVE-2025-27429", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27429", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27429.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-27429" }, { "cve": "CVE-2025-27430", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27430", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27430.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-27430" }, { "cve": "CVE-2025-27435", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27435", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27435.json" } ], "title": "CVE-2025-27435" }, { "cve": "CVE-2025-27437", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27437", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27437.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-27437" }, { "cve": "CVE-2025-30013", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30013.json" } ], "title": "CVE-2025-30013" }, { "cve": "CVE-2025-30014", "cwe": { "id": "CWE-35", "name": "Path Traversal: \u0027.../...//\u0027" }, "notes": [ { "category": "other", "text": "Path Traversal: \u0027.../...//\u0027", "title": "CWE-35" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30014", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30014.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-30014" }, { "cve": "CVE-2025-30015", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30015", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30015.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-30015" }, { "cve": "CVE-2025-30016", "cwe": { "id": "CWE-921", "name": "Storage of Sensitive Data in a Mechanism without Access Control" }, "notes": [ { "category": "other", "text": "Storage of Sensitive Data in a Mechanism without Access Control", "title": "CWE-921" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30016", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30016.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-30016" }, { "cve": "CVE-2025-30017", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30017", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30017.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-30017" }, { "cve": "CVE-2025-31324", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31324", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31324.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-31324" }, { "cve": "CVE-2025-31327", "cwe": { "id": "CWE-472", "name": "External Control of Assumed-Immutable Web Parameter" }, "notes": [ { "category": "other", "text": "External Control of Assumed-Immutable Web Parameter", "title": "CWE-472" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31327", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31327.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-31327" }, { "cve": "CVE-2025-31328", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31328", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31328.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-31328" }, { "cve": "CVE-2025-31330", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31330", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31330.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-31330" }, { "cve": "CVE-2025-31331", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31331", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31331.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-31331" }, { "cve": "CVE-2025-31332", "cwe": { "id": "CWE-277", "name": "Insecure Inherited Permissions" }, "notes": [ { "category": "other", "text": "Insecure Inherited Permissions", "title": "CWE-277" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31332", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31332.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-31332" }, { "cve": "CVE-2025-31333", "cwe": { "id": "CWE-472", "name": "External Control of Assumed-Immutable Web Parameter" }, "notes": [ { "category": "other", "text": "External Control of Assumed-Immutable Web Parameter", "title": "CWE-472" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31333", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31333.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-426681", "CSAFPID-367586", "CSAFPID-426682", "CSAFPID-426483", "CSAFPID-447161", "CSAFPID-447167", "CSAFPID-447158", "CSAFPID-447155", "CSAFPID-447160", "CSAFPID-447163", "CSAFPID-447165", "CSAFPID-447156", "CSAFPID-447164", "CSAFPID-710027", "CSAFPID-426703", "CSAFPID-426706", "CSAFPID-426707", "CSAFPID-426708", "CSAFPID-426704", "CSAFPID-426705", "CSAFPID-447141", "CSAFPID-447140", "CSAFPID-847883", "CSAFPID-426837", "CSAFPID-1176052", "CSAFPID-1333259", "CSAFPID-2351307", "CSAFPID-2538790", "CSAFPID-2538791", "CSAFPID-2538792", "CSAFPID-2538793", "CSAFPID-2538794", "CSAFPID-2538799", "CSAFPID-2538800", "CSAFPID-2538801", "CSAFPID-2538802", "CSAFPID-2538803", "CSAFPID-2538804", "CSAFPID-2538805", "CSAFPID-2538806", "CSAFPID-2538773", "CSAFPID-2538774", "CSAFPID-2538775", "CSAFPID-2538776", "CSAFPID-2538777", "CSAFPID-2538778", "CSAFPID-2538779", "CSAFPID-2538780", "CSAFPID-2538781", "CSAFPID-1307450", "CSAFPID-1297130", "CSAFPID-1297107", "CSAFPID-1230533", "CSAFPID-1921506", "CSAFPID-1230555", "CSAFPID-1230719", "CSAFPID-1230702", "CSAFPID-1304671", "CSAFPID-1921487", "CSAFPID-1297186", "CSAFPID-1988023", "CSAFPID-1988024", "CSAFPID-1175835", "CSAFPID-2473272", "CSAFPID-2632442", "CSAFPID-2473273", "CSAFPID-2632443", "CSAFPID-1425816", "CSAFPID-2632444", "CSAFPID-1306891", "CSAFPID-1332128", "CSAFPID-605062", "CSAFPID-605061", "CSAFPID-605064", "CSAFPID-345584", "CSAFPID-345586", "CSAFPID-2364492", "CSAFPID-1330296", "CSAFPID-1459777", "CSAFPID-1459778", "CSAFPID-1459779", "CSAFPID-1861039", "CSAFPID-1861040", "CSAFPID-1861041", "CSAFPID-2140760", "CSAFPID-2140804", "CSAFPID-2140795", "CSAFPID-2140773", "CSAFPID-2140818", "CSAFPID-2140755", "CSAFPID-2140803", "CSAFPID-2140852", "CSAFPID-2140842", "CSAFPID-2140814", "CSAFPID-2140749", "CSAFPID-2140796", "CSAFPID-2140856", "CSAFPID-2140834", "CSAFPID-2140851", "CSAFPID-2140742", "CSAFPID-2140825", "CSAFPID-2631681", "CSAFPID-2631682", "CSAFPID-2631683", "CSAFPID-2631684", "CSAFPID-2631685", "CSAFPID-2631686", "CSAFPID-2631680", "CSAFPID-1306888", "CSAFPID-710118", "CSAFPID-2632409", "CSAFPID-2632410", "CSAFPID-2632411", "CSAFPID-2632412", "CSAFPID-2633939", "CSAFPID-426454", "CSAFPID-426453", "CSAFPID-426456", "CSAFPID-426455", "CSAFPID-426457", "CSAFPID-1295436", "CSAFPID-2118594", "CSAFPID-2631732", "CSAFPID-2631733", "CSAFPID-2631734", "CSAFPID-2631731", "CSAFPID-1295163", "CSAFPID-735564", "CSAFPID-446586", "CSAFPID-1111431", "CSAFPID-710125", "CSAFPID-710119", "CSAFPID-710115", "CSAFPID-336862", "CSAFPID-345588", "CSAFPID-345621", "CSAFPID-345620", "CSAFPID-345590", "CSAFPID-345585", "CSAFPID-345591", "CSAFPID-345592", "CSAFPID-345589", "CSAFPID-345587", "CSAFPID-426833", "CSAFPID-1176305", "CSAFPID-2352521", "CSAFPID-2352520", "CSAFPID-1304029", "CSAFPID-2352519", "CSAFPID-2538090", "CSAFPID-2539577", "CSAFPID-2352518", "CSAFPID-2632425", "CSAFPID-2632426", "CSAFPID-2632427", "CSAFPID-2632428", "CSAFPID-2632429" ] } ], "title": "CVE-2025-31333" } ] }
ncsc-2025-0127
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in verschillende Financial Services producten", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen niet-geauthenticeerde kwaadwillenden in staat om via HTTP toegang te krijgen tot kritieke gegevens, wat kan leiden tot ongeautoriseerde gegevenstoegang en andere beveiligingsrisico\u0027s. Kwaadwillenden kunnen ook gebruik maken van misconfiguraties en kwetsbaarheden in de software om privilege-escalatie, denial-of-service en remote code execution uit te voeren.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" }, { "category": "general", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "general", "text": "Storage of Sensitive Data in a Mechanism without Access Control", "title": "CWE-921" }, { "category": "general", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Incorrect Implementation of Authentication Algorithm", "title": "CWE-303" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Financial Services", "tracking": { "current_release_date": "2025-04-16T15:00:12.952979Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0127", "initial_release_date": "2025-04-16T15:00:12.952979Z", "revision_history": [ { "date": "2025-04-16T15:00:12.952979Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/8.1.2.7.0", "product": { "name": "vers:unknown/8.1.2.7.0", "product_id": "CSAFPID-2698335" } }, { "category": "product_version_range", "name": "vers:unknown/8.1.3.0", "product": { "name": "vers:unknown/8.1.3.0", "product_id": "CSAFPID-1838588" } } ], "category": "product_name", "name": "Financial Services Model Management and Governance" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/8.0.7.8", "product": { "name": "vers:unknown/8.0.7.8", "product_id": "CSAFPID-1838570" } }, { "category": "product_version_range", "name": "vers:unknown/8.0.8.6", "product": { "name": "vers:unknown/8.0.8.6", "product_id": "CSAFPID-1838583" } }, { "category": "product_version_range", "name": "vers:unknown/8.1.1.4", "product": { "name": "vers:unknown/8.1.1.4", "product_id": "CSAFPID-2698354" } }, { "category": "product_version_range", "name": "vers:unknown/8.1.2.5", "product": { "name": "vers:unknown/8.1.2.5", "product_id": "CSAFPID-1838577" } } ], "category": "product_name", "name": "Financial Services Analytical Applications Infrastructure" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/8.0.8.1", "product": { "name": "vers:unknown/8.0.8.1", "product_id": "CSAFPID-1199519" } }, { "category": "product_version_range", "name": "vers:unknown/8.1.2.7", "product": { "name": "vers:unknown/8.1.2.7", "product_id": "CSAFPID-1838573" } }, { "category": "product_version_range", "name": "vers:unknown/8.1.2.8", "product": { "name": "vers:unknown/8.1.2.8", "product_id": "CSAFPID-1838574" } } ], "category": "product_name", "name": "Financial Services Behavior Detection Platform" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/14.7.0.7.0", "product": { "name": "vers:unknown/14.7.0.7.0", "product_id": "CSAFPID-2698380" } } ], "category": "product_name", "name": "Banking Liquidity Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/8.1.2.6", "product": { "name": "vers:unknown/8.1.2.6", "product_id": "CSAFPID-1838589" } } ], "category": "product_name", "name": "Financial Services Compliance Studio" } ], "category": "product_family", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.1.2.6", "product": { "name": "vers:oracle/8.1.2.6", "product_id": "CSAFPID-1839860", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.2.7", "product": { "name": "vers:oracle/8.1.2.7", "product_id": "CSAFPID-1839857", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.2.7.0", "product": { "name": "vers:oracle/8.1.2.7.0", "product_id": "CSAFPID-2699019", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.3.0", "product": { "name": "vers:oracle/8.1.3.0", "product_id": "CSAFPID-1839858", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Financial Services Model Management and Governance" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/21.1.0.0.0", "product": { "name": "vers:oracle/21.1.0.0.0", "product_id": "CSAFPID-2698953", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:21.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/22.1.0.0.0", "product": { "name": "vers:oracle/22.1.0.0.0", "product_id": "CSAFPID-2698951", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/22.2.0.0.0", "product": { "name": "vers:oracle/22.2.0.0.0", "product_id": "CSAFPID-2698952", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.2.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Banking APIs" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/21.1.0.0.0", "product": { "name": "vers:oracle/21.1.0.0.0", "product_id": "CSAFPID-2698992", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:21.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/22.1.0.0.0", "product": { "name": "vers:oracle/22.1.0.0.0", "product_id": "CSAFPID-2698990", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/22.2.0.0.0", "product": { "name": "vers:oracle/22.2.0.0.0", "product_id": "CSAFPID-2698994", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.2.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Banking Digital Experience" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.0.7.8", "product": { "name": "vers:oracle/8.0.7.8", "product_id": "CSAFPID-1839976", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7.8:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.0.8.6", "product": { "name": "vers:oracle/8.0.8.6", "product_id": "CSAFPID-1839966", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8.6:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.1.4", "product": { "name": "vers:oracle/8.1.1.4", "product_id": "CSAFPID-2699017", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.2.5", "product": { "name": "vers:oracle/8.1.2.5", "product_id": "CSAFPID-1839974", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.5:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Financial Services Analytical Applications Infrastructure" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/5.1.0.0.0", "product": { "name": "vers:oracle/5.1.0.0.0", "product_id": "CSAFPID-2699099", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:5.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/6.1.0.0.0", "product": { "name": "vers:oracle/6.1.0.0.0", "product_id": "CSAFPID-2699100", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.0.0.0.0", "product": { "name": "vers:oracle/7.0.0.0.0", "product_id": "CSAFPID-2699101", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:7.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=2.9.0.0.0|\u003c=7.0.0.0.0", "product": { "name": "vers:oracle/\u003e=2.9.0.0.0|\u003c=7.0.0.0.0", "product_id": "CSAFPID-1839884", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.0.0-7.0.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Financial Services Revenue Management and Billing" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=14.4.0.0.0|\u003c=14.7.0.0.0", "product": { "name": "vers:oracle/\u003e=14.4.0.0.0|\u003c=14.7.0.0.0", "product_id": "CSAFPID-1839866", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.4.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0", "product": { "name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0", "product_id": "CSAFPID-2698995", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Banking Corporate Lending Process Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0", "product": { "name": "vers:oracle/\u003e=14.5.0.0.0|\u003c=14.7.0.0.0", "product_id": "CSAFPID-1839867", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.5.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Banking Origination" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.0.8.1", "product": { "name": "vers:oracle/8.0.8.1", "product_id": "CSAFPID-1839881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.2.7", "product": { "name": "vers:oracle/8.1.2.7", "product_id": "CSAFPID-1839880", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.2.8", "product": { "name": "vers:oracle/8.1.2.8", "product_id": "CSAFPID-1839882", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.2.9", "product": { "name": "vers:oracle/8.1.2.9", "product_id": "CSAFPID-2698954", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.9:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Financial Services Behavior Detection Platform" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.0.8", "product": { "name": "vers:oracle/8.0.8", "product_id": "CSAFPID-1839878", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:enterprise:*:*:*" } } } ], "category": "product_name", "name": "Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/14.7.0.7.0", "product": { "name": "vers:oracle/14.7.0.7.0", "product_id": "CSAFPID-2698938", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.7.5.0.0", "product": { "name": "vers:oracle/14.7.5.0.0", "product_id": "CSAFPID-1839923", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.5.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Banking Liquidity Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.1.2.6", "product": { "name": "vers:oracle/8.1.2.6", "product_id": "CSAFPID-1839871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.2.9", "product": { "name": "vers:oracle/8.1.2.9", "product_id": "CSAFPID-2699005", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.9:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Financial Services Compliance Studio" } ], "category": "product_family", "name": "Oracle Financial Services Applications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:semver/5.1.0.0.0", "product": { "name": "vers:semver/5.1.0.0.0", "product_id": "CSAFPID-2698450" } }, { "category": "product_version_range", "name": "vers:semver/6.1.0.0.0", "product": { "name": "vers:semver/6.1.0.0.0", "product_id": "CSAFPID-2698451" } }, { "category": "product_version_range", "name": "vers:semver/7.0.0.0.0", "product": { "name": "vers:semver/7.0.0.0.0", "product_id": "CSAFPID-2698452" } } ], "category": "product_name", "name": "Oracle Financial Services Revenue Management and Billing" } ], "category": "vendor", "name": "Oracle Corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-28170", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2021-28170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-28170.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2021-28170" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-49582", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49582", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2023-49582" }, { "cve": "CVE-2024-5206", "cwe": { "id": "CWE-921", "name": "Storage of Sensitive Data in a Mechanism without Access Control" }, "notes": [ { "category": "other", "text": "Storage of Sensitive Data in a Mechanism without Access Control", "title": "CWE-921" }, { "category": "other", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5206", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5206.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-5206" }, { "cve": "CVE-2024-28168", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28168", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-28168" }, { "cve": "CVE-2024-28219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-28219" }, { "cve": "CVE-2024-35195", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "other", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-35195" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38820", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-38820" }, { "cve": "CVE-2024-38827", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38827", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-38827" }, { "cve": "CVE-2024-47072", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-56128", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "notes": [ { "category": "other", "text": "Incorrect Implementation of Authentication Algorithm", "title": "CWE-303" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-56128" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2024-57699", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2024-57699", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2024-57699" }, { "cve": "CVE-2025-21573", "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21573.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2025-21573" }, { "cve": "CVE-2025-23184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json" } ], "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24970", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698335", "CSAFPID-1838588", "CSAFPID-1839860", "CSAFPID-1839857", "CSAFPID-2699019", "CSAFPID-1839858", "CSAFPID-2698953", "CSAFPID-2698951", "CSAFPID-2698952", "CSAFPID-2698992", "CSAFPID-2698990", "CSAFPID-2698994", "CSAFPID-1838570", "CSAFPID-1838583", "CSAFPID-2698354", "CSAFPID-1839976", "CSAFPID-1838577", "CSAFPID-1839966", "CSAFPID-2699017", "CSAFPID-1839974", "CSAFPID-2699099", "CSAFPID-2699100", "CSAFPID-2699101", "CSAFPID-1839884", "CSAFPID-2698450", "CSAFPID-2698451", "CSAFPID-2698452", "CSAFPID-1839866", "CSAFPID-2698995", "CSAFPID-1839867", "CSAFPID-1199519", "CSAFPID-1838573", "CSAFPID-1838574", "CSAFPID-1839881", "CSAFPID-1839880", "CSAFPID-1839882", "CSAFPID-2698954", "CSAFPID-1839878", "CSAFPID-2698380", "CSAFPID-2698938", "CSAFPID-1839923", "CSAFPID-1838589", "CSAFPID-1839871", "CSAFPID-2699005" ] } ], "title": "CVE-2025-24970" } ] }
ncsc-2025-0041
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "F5 heeft kwetsbaarheden verholpen in BIG-IP.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van een beveiligingsmaatregel\n- Uitvoer van willekeurige code (Root/admin)\n- Uitvoer van willekeurige code (Gebruiker)\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "F5 heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000138757" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000138932" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000139656" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000139778" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000140578" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000140920" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000140933" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000140947" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000140950" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000141003" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://my.f5.com/manage/s/article/K000148587" } ], "title": "Kwetsbaarheden verholpen in F5 BIG-IP", "tracking": { "current_release_date": "2025-02-11T06:51:17.629249Z", "id": "NCSC-2025-0041", "initial_release_date": "2025-02-07T07:38:11.981975Z", "revision_history": [ { "date": "2025-02-07T07:38:11.981975Z", "number": "0", "summary": "Initiele versie" }, { "date": "2025-02-11T06:51:17.629249Z", "number": "1", "summary": "Door een technisch issue is deze advisory eerder verstuurd met een invalide signature, waardoor automatische verwerking mogelijk verstoord is. Deze update verhelpt dat. Er is verder geen inhoudelijke wijziging." } ], "status": "final", "version": "1.0.1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "big-ip", "product": { "name": "big-ip", "product_id": "CSAFPID-310988", "product_identification_helper": { "cpe": "cpe:2.3:a:f5:big-ip:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "big-ip_next", "product": { "name": "big-ip_next", "product_id": "CSAFPID-636427", "product_identification_helper": { "cpe": "cpe:2.3:a:f5:big-ip_next:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "big-ip_next_central_manager", "product": { "name": "big-ip_next_central_manager", "product_id": "CSAFPID-1620063", "product_identification_helper": { "cpe": "cpe:2.3:a:f5:big-ip_next_central_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "big-ip_next_cnf", "product": { "name": "big-ip_next_cnf", "product_id": "CSAFPID-636429", "product_identification_helper": { "cpe": "cpe:2.3:a:f5:big-ip_next_cnf:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "big-ip_next_spk", "product": { "name": "big-ip_next_spk", "product_id": "CSAFPID-636428", "product_identification_helper": { "cpe": "cpe:2.3:a:f5:big-ip_next_spk:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nginx_open_source", "product": { "name": "nginx_open_source", "product_id": "CSAFPID-842689", "product_identification_helper": { "cpe": "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nginx_plus", "product": { "name": "nginx_plus", "product_id": "CSAFPID-842688", "product_identification_helper": { "cpe": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "f5" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-0064", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2014-0064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0064.json" } ], "title": "CVE-2014-0064" }, { "cve": "CVE-2014-0065", "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2014-0065", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0065.json" } ], "title": "CVE-2014-0065" }, { "cve": "CVE-2014-0066", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2014-0066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0066.json" } ], "title": "CVE-2014-0066" }, { "cve": "CVE-2014-0067", "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2014-0067", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0067.json" } ], "title": "CVE-2014-0067" }, { "cve": "CVE-2019-5010", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2019-5010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-5010.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2019-5010" }, { "cve": "CVE-2019-16056", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2019-16056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-16056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2019-16056" }, { "cve": "CVE-2022-26488", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2022-26488", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26488.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2022-26488" }, { "cve": "CVE-2024-36242", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2024-36242" }, { "cve": "CVE-2024-38660", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38660", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38660.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2024-38660" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-20029", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20029", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20029.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-20029" }, { "cve": "CVE-2025-20045", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20045", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20045.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-20045" }, { "cve": "CVE-2025-20058", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-20058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-20058" }, { "cve": "CVE-2025-21087", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21087", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21087.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-21087" }, { "cve": "CVE-2025-21091", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21091.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-21091" }, { "cve": "CVE-2025-22846", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-22846", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22846.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-22846" }, { "cve": "CVE-2025-22891", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-22891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-22891" }, { "cve": "CVE-2025-23239", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23239", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23239.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-23239" }, { "cve": "CVE-2025-23412", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23412", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23412.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-23412" }, { "cve": "CVE-2025-23413", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23413", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23413.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-23413" }, { "cve": "CVE-2025-23415", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23415", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23415.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-23415" }, { "cve": "CVE-2025-23419", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23419", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23419.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-23419" }, { "cve": "CVE-2025-24312", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24312", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24312.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-24312" }, { "cve": "CVE-2025-24319", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24319.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-24319" }, { "cve": "CVE-2025-24320", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24320", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24320.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-24320" }, { "cve": "CVE-2025-24326", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24326", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24326.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-24326" }, { "cve": "CVE-2025-24497", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24497", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24497.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688" ] } ], "title": "CVE-2025-24497" } ] }
ncsc-2025-0020
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse database producten en subsystemen, zoals de Core Database, Graal, Application Express, GoldenGate en REST data.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden bevinden zich in verschillende componenten van de Oracle Database, waaronder de Data Mining component en de Java VM. Deze kwetsbaarheden stellen laaggeprivilegieerde geauthenticeerde gebruikers in staat om het systeem te compromitteren, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie. De Java VM-kwetsbaarheid kan ook leiden tot ongeautoriseerde wijzigingen van gegevens.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Unchecked Error Condition", "title": "CWE-391" }, { "category": "general", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" }, { "category": "general", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Expected Behavior Violation", "title": "CWE-440" }, { "category": "general", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" }, { "category": "general", "text": "Authentication Bypass Using an Alternate Path or Channel", "title": "CWE-288" }, { "category": "general", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2025-01-22T13:30:16.354373Z", "id": "NCSC-2025-0020", "initial_release_date": "2025-01-22T13:30:16.354373Z", "revision_history": [ { "date": "2025-01-22T13:30:16.354373Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "graal_development_kit_for_micronaut", "product": { "name": "graal_development_kit_for_micronaut", "product_id": "CSAFPID-1751216", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graal_development_kit_for_micronaut:23.5-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_data_mining", "product": { "name": "database_-_data_mining", "product_id": "CSAFPID-1751200", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_data_mining:19.3-19.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_data_mining", "product": { "name": "database_-_data_mining", "product_id": "CSAFPID-1751199", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_data_mining:21.3-21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_migration_assistant_for_unicode", "product": { "name": "database_migration_assistant_for_unicode", "product_id": "CSAFPID-1751212", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_migration_assistant_for_unicode:19.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_server", "product": { "name": "database_server", "product_id": "CSAFPID-1503604", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_server:_java_vm___23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_graalvm_multilingual_engine", "product": { "name": "database_-_graalvm_multilingual_engine", "product_id": "CSAFPID-1751223", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:21.4-21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_graalvm_multilingual_engine", "product": { "name": "database_-_graalvm_multilingual_engine", "product_id": "CSAFPID-1751224", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:23.5-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1751298", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1751299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751093", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751094", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751095", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751204", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751203", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "rest_data_services", "product": { "name": "rest_data_services", "product_id": "CSAFPID-711746", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "rest_data_services", "product": { "name": "rest_data_services", "product_id": "CSAFPID-1751305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:rest_data_services:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "rest_data_services", "product": { "name": "rest_data_services", "product_id": "CSAFPID-1751304", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:rest_data_services:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45772", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "references": [ { "category": "self", "summary": "CVE-2024-45772", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45772.json" } ], "title": "CVE-2024-45772" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47561", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299" ] } ], "title": "CVE-2024-47561" }, { "cve": "CVE-2024-50379", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "references": [ { "category": "self", "summary": "CVE-2024-50379", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json" } ], "title": "CVE-2024-50379" }, { "cve": "CVE-2024-52316", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "notes": [ { "category": "other", "text": "Unchecked Error Condition", "title": "CWE-391" }, { "category": "other", "text": "Authentication Bypass Using an Alternate Path or Channel", "title": "CWE-288" } ], "references": [ { "category": "self", "summary": "CVE-2024-52316", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52316.json" } ], "title": "CVE-2024-52316" }, { "cve": "CVE-2024-54677", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-54677", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json" } ], "title": "CVE-2024-54677" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-21553", "references": [ { "category": "self", "summary": "CVE-2025-21553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21553.json" } ], "title": "CVE-2025-21553" }, { "cve": "CVE-2025-21557", "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21557", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21557.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2025-21557" }, { "cve": "CVE-2022-26345", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1751199", "CSAFPID-1751200" ] }, "references": [ { "category": "self", "summary": "CVE-2022-26345", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26345.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751199", "CSAFPID-1751200" ] } ], "title": "CVE-2022-26345" }, { "cve": "CVE-2023-27043", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-27043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json" } ], "title": "CVE-2023-27043" }, { "cve": "CVE-2023-36730", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1751203", "CSAFPID-1751204" ] }, "references": [ { "category": "self", "summary": "CVE-2023-36730", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36730.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751203", "CSAFPID-1751204" ] } ], "title": "CVE-2023-36730" }, { "cve": "CVE-2023-36785", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1751203", "CSAFPID-1751204" ] }, "references": [ { "category": "self", "summary": "CVE-2023-36785", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36785.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751203", "CSAFPID-1751204" ] } ], "title": "CVE-2023-36785" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "other", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "other", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216" ] } ], "title": "CVE-2023-52428" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-4030", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "references": [ { "category": "self", "summary": "CVE-2024-4030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json" } ], "title": "CVE-2024-4030" }, { "cve": "CVE-2024-4032", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "other", "text": "Expected Behavior Violation", "title": "CWE-440" } ], "references": [ { "category": "self", "summary": "CVE-2024-4032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json" } ], "title": "CVE-2024-4032" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-6763", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "other", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" } ], "product_status": { "known_affected": [ "CSAFPID-1751304", "CSAFPID-1751305" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751304", "CSAFPID-1751305" ] } ], "title": "CVE-2024-6763" }, { "cve": "CVE-2024-6923", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2024-6923", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6923.json" } ], "title": "CVE-2024-6923" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-8088", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2024-8088", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8088.json" } ], "title": "CVE-2024-8088" }, { "cve": "CVE-2024-8927", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-8927", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8927.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-8927" }, { "cve": "CVE-2024-11053", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2024-11053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json" } ], "title": "CVE-2024-11053" }, { "cve": "CVE-2024-21211", "cwe": { "id": "CWE-922", "name": "Insecure Storage of Sensitive Information" }, "notes": [ { "category": "other", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" } ], "product_status": { "known_affected": [ "CSAFPID-1751223", "CSAFPID-1751224" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21211", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21211.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751223", "CSAFPID-1751224" ] } ], "title": "CVE-2024-21211" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-24789", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" } ], "references": [ { "category": "self", "summary": "CVE-2024-24789", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24789.json" } ], "title": "CVE-2024-24789" }, { "cve": "CVE-2024-24790", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "other", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" } ], "references": [ { "category": "self", "summary": "CVE-2024-24790", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24790.json" } ], "title": "CVE-2024-24790" }, { "cve": "CVE-2024-24791", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-24791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json" } ], "title": "CVE-2024-24791" }, { "cve": "CVE-2024-28757", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28757", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28757.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] } ], "title": "CVE-2024-28757" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-33599", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json" } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-33600", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json" } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "other", "text": "Reachable Assertion", "title": "CWE-617" } ], "references": [ { "category": "self", "summary": "CVE-2024-33601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json" } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "references": [ { "category": "self", "summary": "CVE-2024-33602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json" } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1650825" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650825" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1650825" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38820", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650825" ] } ], "title": "CVE-2024-38820" } ] }
ncsc-2025-0128
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in verschillende producten, waaronder de Utilities Application Framework, WebLogic Server, en Fusion Middleware.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om toegang te krijgen tot kritieke gegevens, Denial-of-Service (DoS) te veroorzaken, en in sommige gevallen zelfs volledige controle over systemen te verkrijgen. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal vervaardigde verzoeken te sturen of door gebruik te maken van onveilige configuraties in de getroffen producten.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Fusion Middleware", "tracking": { "current_release_date": "2025-04-16T15:01:24.587426Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0128", "initial_release_date": "2025-04-16T15:01:24.587426Z", "revision_history": [ { "date": "2025-04-16T15:01:24.587426Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2699078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:access_manager:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Access Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839842", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2698989", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_process_management_suite:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Business Process Management Suite" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839864", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2698967", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:http_server:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle HTTP Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839938", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2699074", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:managed_file_transfer:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Managed File Transfer" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2698998", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:soa_suite:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2698997", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:soa_suite:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle SOA Suite" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839896", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-1839897", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-1840030", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebLogic Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.5.7", "product": { "name": "vers:oracle/8.5.7", "product_id": "CSAFPID-1839872", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Outside In Technology" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1840014", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-1839982", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2699125", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Coherence" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839988", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Fusion Middleware MapViewer" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2698948", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle JDeveloper" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-2699057", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_forms_recognition:14.1.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebCenter Forms Recognition" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1840006", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebCenter Portal" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2698985", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Data Integrator" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1840028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2699064", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_activity_monitoring:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Business Activity Monitoring" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2699044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:service_bus:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Service Bus" } ], "category": "product_family", "name": "Oracle Fusion Middleware" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1213401" } } ], "category": "product_name", "name": "Managed File Transfer" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.3.0", "product": { "name": "vers:unknown/12.2.1.3.0", "product_id": "CSAFPID-1536644" } }, { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1536288" } }, { "category": "product_version_range", "name": "vers:unknown/14.1.1.0.0", "product": { "name": "vers:unknown/14.1.1.0.0", "product_id": "CSAFPID-1536278" } } ], "category": "product_name", "name": "Weblogic Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/8.5.7", "product": { "name": "vers:unknown/8.5.7", "product_id": "CSAFPID-1233360" } } ], "category": "product_name", "name": "Outside In Technology" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1210435" } }, { "category": "product_version_range", "name": "vers:unknown/14.1.1.0.0", "product": { "name": "vers:unknown/14.1.1.0.0", "product_id": "CSAFPID-1210304" } } ], "category": "product_name", "name": "Coherence" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1247956" } } ], "category": "product_name", "name": "Jdeveloper (Application)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.3.0", "product": { "name": "vers:unknown/12.2.1.3.0", "product_id": "CSAFPID-1214253" } }, { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1232894" } } ], "category": "product_name", "name": "WebCenter Portal" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1201529" } } ], "category": "product_name", "name": "Data Integrator" } ], "category": "product_family", "name": "Oracle" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1144680", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-1144604", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebLogic Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-39413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/14.1.1.0.0", "product": { "name": "vers:unknown/14.1.1.0.0", "product_id": "CSAFPID-39412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Coherence" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.3.0", "product": { "name": "vers:oracle/12.2.1.3.0", "product_id": "CSAFPID-1144910" } }, { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1144911", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebCenter Portal" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.3.0", "product": { "name": "vers:unknown/12.2.1.3.0", "product_id": "CSAFPID-317201", "product_identification_helper": { "cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-307786", "product_identification_helper": { "cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "WebCenter Portal" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13936", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2020-13936", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13936.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2020-13936" }, { "cve": "CVE-2020-25649", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2020-25649", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-25649.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2020-25649" }, { "cve": "CVE-2023-26464", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26464", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26464.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2023-26464" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json" } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-11053", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-11053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-11053" }, { "cve": "CVE-2024-11612", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-11612", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11612.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-11612" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-28168", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28168", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-28168" }, { "cve": "CVE-2024-29857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-29857" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-40896", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40896", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-40896" }, { "cve": "CVE-2024-47072", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47561", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-47561" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52046", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-52046", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-52046" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-23184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json" } ], "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24970", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2025-24970" }, { "cve": "CVE-2025-27363", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27363", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27363.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2025-27363" } ] }
rhsa-2025:11332
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat9 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11332", "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11332.json" } ], "title": "Red Hat Security Advisory: tomcat9 security update", "tracking": { "current_release_date": "2025-08-03T09:25:55+00:00", "generator": { "date": "2025-08-03T09:25:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:11332", "initial_release_date": "2025-07-16T15:19:33+00:00", "revision_history": [ { "date": "2025-07-16T15:19:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:19:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:25:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat9-1:9.0.87-5.el10_0.1.src", "product": { "name": "tomcat9-1:9.0.87-5.el10_0.1.src", "product_id": "tomcat9-1:9.0.87-5.el10_0.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9@9.0.87-5.el10_0.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-admin-webapps@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-docs-webapp@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-el-3.0-api@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-jsp-2.3-api@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-lib@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-servlet-4.0-api@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "product": { "name": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "product_id": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat9-webapps@9.0.87-5.el10_0.1?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat9-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-1:9.0.87-5.el10_0.1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src" }, "product_reference": "tomcat9-1:9.0.87-5.el10_0.1.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" }, "product_reference": "tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:19:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:19:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-1:9.0.87-5.el10_0.1.src", "AppStream-10.0.Z:tomcat9-admin-webapps-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-docs-webapp-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-el-3.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-jsp-2.3-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-lib-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-servlet-4.0-api-1:9.0.87-5.el10_0.1.noarch", "AppStream-10.0.Z:tomcat9-webapps-1:9.0.87-5.el10_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11382
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11382", "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11382.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-08-03T09:25:58+00:00", "generator": { "date": "2025-08-03T09:25:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:11382", "initial_release_date": "2025-07-17T11:05:31+00:00", "revision_history": [ { "date": "2025-07-17T11:05:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-17T11:05:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:25:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_8.5.src", "product": { "name": "tomcat-1:9.0.87-1.el8_8.5.src", "product_id": "tomcat-1:9.0.87-1.el8_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_8.5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el8_8.5?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)", "product_id": "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_8.5.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_8.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T11:05:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T11:05:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-1:9.0.87-1.el8_8.5.src", "AppStream-8.8.0.Z.TUS:tomcat-admin-webapps-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-docs-webapp-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-el-3.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-lib-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_8.5.noarch", "AppStream-8.8.0.Z.TUS:tomcat-webapps-1:9.0.87-1.el8_8.5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:4521
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 5.8 on Red Hat Enterprise Linux versions 7, 8, and 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.8.4 serves as a replacement for Red Hat JBoss Web Server 5.8.3. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation [jws-5] (CVE-2024-56337)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-5] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:4521", "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4521.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.4 release and security update", "tracking": { "current_release_date": "2025-08-03T09:27:45+00:00", "generator": { "date": "2025-08-03T09:27:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:4521", "initial_release_date": "2025-05-08T12:17:27+00:00", "revision_history": [ { "date": "2025-05-08T12:17:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:13:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:27:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.8 for RHEL 9", "product": { "name": "Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el9jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk11@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk8@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-11.redhat_00010.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-11.redhat_00010.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.87-11.redhat_00010.1.el9jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 7 Server", "product_id": "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 8", "product_id": "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src" }, "product_reference": "jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch as a component of Red Hat JBoss Web Server 5.8 for RHEL 9", "product_id": "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-5.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:17:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:17:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el7jws.src", "7Server-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk11-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-java-jdk8-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "7Server-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el7jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el8jws.src", "8Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "8Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el8jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-0:9.0.87-11.redhat_00010.1.el9jws.src", "9Base-JWS-5.8:jws5-tomcat-admin-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-docs-webapp-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-el-3.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-javadoc-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-jsp-2.3-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-lib-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-selinux-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-servlet-4.0-api-0:9.0.87-11.redhat_00010.1.el9jws.noarch", "9Base-JWS-5.8:jws5-tomcat-webapps-0:9.0.87-11.redhat_00010.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:4522
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 5.8.4 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.8.4 serves as a replacement for Red Hat JBoss Web Server 5.8.3. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation [jws-5] (CVE-2024-56337)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-5] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:4522", "url": "https://access.redhat.com/errata/RHSA-2025:4522" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/5.8/html/red_hat_jboss_web_server_5.8_service_pack_4_release_notes/index" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4522.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.4 release and security update", "tracking": { "current_release_date": "2025-08-03T09:27:35+00:00", "generator": { "date": "2025-08-03T09:27:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:4522", "initial_release_date": "2025-05-08T12:15:06+00:00", "revision_history": [ { "date": "2025-05-08T12:15:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:13:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:27:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5", "product": { "name": "Red Hat JBoss Web Server 5", "product_id": "Red Hat JBoss Web Server 5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:15:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4522" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-08T12:15:06+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4522" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11381
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11381", "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11381.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-08-03T09:25:49+00:00", "generator": { "date": "2025-08-03T09:25:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:11381", "initial_release_date": "2025-07-17T10:53:55+00:00", "revision_history": [ { "date": "2025-07-17T10:53:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-17T10:53:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:25:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_2.4.src", "product": { "name": "tomcat-1:9.0.87-1.el9_2.4.src", "product_id": "tomcat-1:9.0.87-1.el9_2.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_2.4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el9_2.4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_2.4.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src" }, "product_reference": "tomcat-1:9.0.87-1.el9_2.4.src", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)", "product_id": "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el9_2.4.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T10:53:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-17T10:53:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-1:9.0.87-1.el9_2.4.src", "AppStream-9.2.0.Z.E4S:tomcat-admin-webapps-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-docs-webapp-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-el-3.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-jsp-2.3-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-lib-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-servlet-4.0-api-1:9.0.87-1.el9_2.4.noarch", "AppStream-9.2.0.Z.E4S:tomcat-webapps-1:9.0.87-1.el9_2.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11333
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11333", "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11333.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-08-03T09:25:22+00:00", "generator": { "date": "2025-08-03T09:25:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:11333", "initial_release_date": "2025-07-16T15:30:03+00:00", "revision_history": [ { "date": "2025-07-16T15:30:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:30:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:25:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_10.4.src", "product": { "name": "tomcat-1:9.0.87-1.el8_10.4.src", "product_id": "tomcat-1:9.0.87-1.el8_10.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_10.4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el8_10.4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el8_10.4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src" }, "product_reference": "tomcat-1:9.0.87-1.el8_10.4.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el8_10.4.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:30:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:30:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-1:9.0.87-1.el8_10.4.src", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el8_10.4.noarch", "AppStream-8.10.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-1.el8_10.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11334
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11334", "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11334.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-08-03T09:25:30+00:00", "generator": { "date": "2025-08-03T09:25:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:11334", "initial_release_date": "2025-07-16T15:25:28+00:00", "revision_history": [ { "date": "2025-07-16T15:25:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:25:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:25:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_4.4.src", "product": { "name": "tomcat-1:9.0.87-1.el9_4.4.src", "product_id": "tomcat-1:9.0.87-1.el9_4.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_4.4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "product_id": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-1.el9_4.4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-1.el9_4.4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src" }, "product_reference": "tomcat-1:9.0.87-1.el9_4.4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-1.el9_4.4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-1:9.0.87-1.el9_4.4.src", "AppStream-9.4.0.Z.EUS:tomcat-admin-webapps-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-docs-webapp-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-el-3.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-jsp-2.3-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-lib-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-servlet-4.0-api-1:9.0.87-1.el9_4.4.noarch", "AppStream-9.4.0.Z.EUS:tomcat-webapps-1:9.0.87-1.el9_4.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:11335
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)\n\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:11335", "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11335.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-08-03T09:25:39+00:00", "generator": { "date": "2025-08-03T09:25:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:11335", "initial_release_date": "2025-07-16T15:28:33+00:00", "revision_history": [ { "date": "2025-07-16T15:28:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-16T15:28:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T09:25:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-3.el9_6.1.src", "product": { "name": "tomcat-1:9.0.87-3.el9_6.1.src", "product_id": "tomcat-1:9.0.87-3.el9_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-3.el9_6.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-3.0-api@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-2.3-api@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-4.0-api@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "product": { "name": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "product_id": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@9.0.87-3.el9_6.1?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:9.0.87-3.el9_6.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src" }, "product_reference": "tomcat-1:9.0.87-3.el9_6.1.src", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" }, "product_reference": "tomcat-webapps-1:9.0.87-3.el9_6.1.noarch", "relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2024-12-20T16:00:45.883126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333521" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2024-50379 in Apache Tomcat was insufficient to mitigate the issue fully. A Time-of-check Time-of-use (TOCTOU) race condition occurs during JSP compilation on case-insensitive file systems when the default servlet is enabled for writing. This vulnerability allows an uploaded file to be treated as a JSP and executed, resulting in remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is marked as moderate rather than important due to the specific conditions required for exploitation. For the attack to succeed, the server must be running on a case-insensitive file system (e.g., Windows or macOS) and have the default servlet enabled with write permissions \u2014a configuration that is not common in production-grade environments. Additionally, the attacker must gain the ability to upload files to a writable directory and exploit a race condition to execute them as JSP files, which introduces a level of complexity and timing dependency.\n\nThe pki-servlet-engine package has been obsoleted by the tomcat package as of Red Hat Enterprise Linux 8.9 so no fixes for the servlet engine would be made available.\n\nAlthough Red Hat Satellite Server\u2014 via its Candlepin component\u2014 employs the use of Tomcat, Satellite is itself not considered Affected. Satellite does not provide the Tomcat package\u2014 it is inherited from the underlying RHEL Operating System. Users of Red Hat Satellite are advised to refer to the impact state of the Tomcat package provided by the version of RHEL underpinning the Satellite Server instance, as any errata will be provided via RHEL Application Stream repositories.\n \nIt should be noted that a successful attack requires the server be running on a case-insensitive file system. As Satellite only runs on RHEL\u2014 and RHEL employs case-sensitive filesystems by default\u2014 a typical Satellite server instance is not vulnerable. Additionally, a successful attack also requires the server have the default servlet enabled with write permissions\u2013 a condition which does not exist in a default Satellite deployment. Again, a typical Satellite server instance is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "RHBZ#2333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "category": "external", "summary": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "release_date": "2024-12-20T15:28:54.738000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:28:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-16T15:28:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-1:9.0.87-3.el9_6.1.src", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-admin-webapps-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-docs-webapp-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-el-3.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-jsp-2.3-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-lib-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-servlet-4.0-api-1:9.0.87-3.el9_6.1.noarch", "AppStream-9.6.0.Z.MAIN.EUS:tomcat-webapps-1:9.0.87-3.el9_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
opensuse-su-2025:14896-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat-9.0.99-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat-9.0.99-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14896", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14896-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14896-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14896-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56337 page", "url": "https://www.suse.com/security/cve/CVE-2024-56337/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24813 page", "url": "https://www.suse.com/security/cve/CVE-2025-24813/" } ], "title": "tomcat-9.0.99-1.1 on GA media", "tracking": { "current_release_date": "2025-03-15T00:00:00Z", "generator": { "date": "2025-03-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14896-1", "initial_release_date": "2025-03-15T00:00:00Z", "revision_history": [ { "date": "2025-03-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.99-1.1.aarch64", "product": { "name": "tomcat-9.0.99-1.1.aarch64", "product_id": "tomcat-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.99-1.1.aarch64", "product": { "name": "tomcat-admin-webapps-9.0.99-1.1.aarch64", "product_id": "tomcat-admin-webapps-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.99-1.1.aarch64", "product": { "name": "tomcat-docs-webapp-9.0.99-1.1.aarch64", "product_id": "tomcat-docs-webapp-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.99-1.1.aarch64", "product": { "name": "tomcat-el-3_0-api-9.0.99-1.1.aarch64", "product_id": "tomcat-el-3_0-api-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.99-1.1.aarch64", "product": { "name": "tomcat-embed-9.0.99-1.1.aarch64", "product_id": "tomcat-embed-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.99-1.1.aarch64", "product": { "name": "tomcat-javadoc-9.0.99-1.1.aarch64", "product_id": "tomcat-javadoc-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "product": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "product_id": "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.99-1.1.aarch64", "product": { "name": "tomcat-jsvc-9.0.99-1.1.aarch64", "product_id": "tomcat-jsvc-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.99-1.1.aarch64", "product": { "name": "tomcat-lib-9.0.99-1.1.aarch64", "product_id": "tomcat-lib-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "product": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "product_id": "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.99-1.1.aarch64", "product": { "name": "tomcat-webapps-9.0.99-1.1.aarch64", "product_id": "tomcat-webapps-9.0.99-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-9.0.99-1.1.ppc64le", "product_id": "tomcat-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-admin-webapps-9.0.99-1.1.ppc64le", "product_id": "tomcat-admin-webapps-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-docs-webapp-9.0.99-1.1.ppc64le", "product_id": "tomcat-docs-webapp-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "product_id": "tomcat-el-3_0-api-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-embed-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-embed-9.0.99-1.1.ppc64le", "product_id": "tomcat-embed-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-javadoc-9.0.99-1.1.ppc64le", "product_id": "tomcat-javadoc-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "product_id": "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-jsvc-9.0.99-1.1.ppc64le", "product_id": "tomcat-jsvc-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-lib-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-lib-9.0.99-1.1.ppc64le", "product_id": "tomcat-lib-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "product_id": "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.99-1.1.ppc64le", "product": { "name": "tomcat-webapps-9.0.99-1.1.ppc64le", "product_id": "tomcat-webapps-9.0.99-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.99-1.1.s390x", "product": { "name": "tomcat-9.0.99-1.1.s390x", "product_id": "tomcat-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.99-1.1.s390x", "product": { "name": "tomcat-admin-webapps-9.0.99-1.1.s390x", "product_id": "tomcat-admin-webapps-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.99-1.1.s390x", "product": { "name": "tomcat-docs-webapp-9.0.99-1.1.s390x", "product_id": "tomcat-docs-webapp-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.99-1.1.s390x", "product": { "name": "tomcat-el-3_0-api-9.0.99-1.1.s390x", "product_id": "tomcat-el-3_0-api-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-embed-9.0.99-1.1.s390x", "product": { "name": "tomcat-embed-9.0.99-1.1.s390x", "product_id": "tomcat-embed-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.99-1.1.s390x", "product": { "name": "tomcat-javadoc-9.0.99-1.1.s390x", "product_id": "tomcat-javadoc-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "product": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "product_id": "tomcat-jsp-2_3-api-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.99-1.1.s390x", "product": { "name": "tomcat-jsvc-9.0.99-1.1.s390x", "product_id": "tomcat-jsvc-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-lib-9.0.99-1.1.s390x", "product": { "name": "tomcat-lib-9.0.99-1.1.s390x", "product_id": "tomcat-lib-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "product": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "product_id": "tomcat-servlet-4_0-api-9.0.99-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.99-1.1.s390x", "product": { "name": "tomcat-webapps-9.0.99-1.1.s390x", "product_id": "tomcat-webapps-9.0.99-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.99-1.1.x86_64", "product": { "name": "tomcat-9.0.99-1.1.x86_64", "product_id": "tomcat-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.99-1.1.x86_64", "product": { "name": "tomcat-admin-webapps-9.0.99-1.1.x86_64", "product_id": "tomcat-admin-webapps-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.99-1.1.x86_64", "product": { "name": "tomcat-docs-webapp-9.0.99-1.1.x86_64", "product_id": "tomcat-docs-webapp-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.99-1.1.x86_64", "product": { "name": "tomcat-el-3_0-api-9.0.99-1.1.x86_64", "product_id": "tomcat-el-3_0-api-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.99-1.1.x86_64", "product": { "name": "tomcat-embed-9.0.99-1.1.x86_64", "product_id": "tomcat-embed-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.99-1.1.x86_64", "product": { "name": "tomcat-javadoc-9.0.99-1.1.x86_64", "product_id": "tomcat-javadoc-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "product": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "product_id": "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.99-1.1.x86_64", "product": { "name": "tomcat-jsvc-9.0.99-1.1.x86_64", "product_id": "tomcat-jsvc-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.99-1.1.x86_64", "product": { "name": "tomcat-lib-9.0.99-1.1.x86_64", "product_id": "tomcat-lib-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "product": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "product_id": "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.99-1.1.x86_64", "product": { "name": "tomcat-webapps-9.0.99-1.1.x86_64", "product_id": "tomcat-webapps-9.0.99-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x" }, "product_reference": "tomcat-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-admin-webapps-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-admin-webapps-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x" }, "product_reference": "tomcat-admin-webapps-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-admin-webapps-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-docs-webapp-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-docs-webapp-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x" }, "product_reference": "tomcat-docs-webapp-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-docs-webapp-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-el-3_0-api-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x" }, "product_reference": "tomcat-el-3_0-api-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-el-3_0-api-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-embed-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-embed-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x" }, "product_reference": "tomcat-embed-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-embed-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-javadoc-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-javadoc-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x" }, "product_reference": "tomcat-javadoc-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-javadoc-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x" }, "product_reference": "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-jsvc-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-jsvc-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x" }, "product_reference": "tomcat-jsvc-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-jsvc-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-lib-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-lib-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x" }, "product_reference": "tomcat-lib-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-lib-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x" }, "product_reference": "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64" }, "product_reference": "tomcat-webapps-9.0.99-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le" }, "product_reference": "tomcat-webapps-9.0.99-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x" }, "product_reference": "tomcat-webapps-9.0.99-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64" }, "product_reference": "tomcat-webapps-9.0.99-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56337" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56337", "url": "https://www.suse.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1234663" }, { "category": "external", "summary": "SUSE Bug 1236809 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1236809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-03-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-24813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24813" } ], "notes": [ { "category": "general", "text": "Path Equivalence: \u0027file.Name\u0027 (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat\u0027s file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24813", "url": "https://www.suse.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "SUSE Bug 1239302 for CVE-2025-24813", "url": "https://bugzilla.suse.com/1239302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-03-15T00:00:00Z", "details": "important" } ], "title": "CVE-2025-24813" } ] }
opensuse-su-2025:14897-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat10-10.1.35-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat10-10.1.35-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14897", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14897-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14897-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14897-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56337 page", "url": "https://www.suse.com/security/cve/CVE-2024-56337/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24813 page", "url": "https://www.suse.com/security/cve/CVE-2025-24813/" } ], "title": "tomcat10-10.1.35-1.1 on GA media", "tracking": { "current_release_date": "2025-03-15T00:00:00Z", "generator": { "date": "2025-03-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14897-1", "initial_release_date": "2025-03-15T00:00:00Z", "revision_history": [ { "date": "2025-03-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-10.1.35-1.1.aarch64", "product_id": "tomcat10-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-admin-webapps-10.1.35-1.1.aarch64", "product_id": "tomcat10-admin-webapps-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-doc-10.1.35-1.1.aarch64", "product_id": "tomcat10-doc-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-docs-webapp-10.1.35-1.1.aarch64", "product_id": "tomcat10-docs-webapp-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "product_id": "tomcat10-el-5_0-api-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-embed-10.1.35-1.1.aarch64", "product_id": "tomcat10-embed-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "product_id": "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-jsvc-10.1.35-1.1.aarch64", "product_id": "tomcat10-jsvc-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-lib-10.1.35-1.1.aarch64", "product_id": "tomcat10-lib-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "product_id": "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.35-1.1.aarch64", "product": { "name": "tomcat10-webapps-10.1.35-1.1.aarch64", "product_id": "tomcat10-webapps-10.1.35-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-10.1.35-1.1.ppc64le", "product_id": "tomcat10-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "product_id": "tomcat10-admin-webapps-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-doc-10.1.35-1.1.ppc64le", "product_id": "tomcat10-doc-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "product_id": "tomcat10-docs-webapp-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "product_id": "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-embed-10.1.35-1.1.ppc64le", "product_id": "tomcat10-embed-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "product_id": "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-jsvc-10.1.35-1.1.ppc64le", "product_id": "tomcat10-jsvc-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-lib-10.1.35-1.1.ppc64le", "product_id": "tomcat10-lib-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "product_id": "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.35-1.1.ppc64le", "product": { "name": "tomcat10-webapps-10.1.35-1.1.ppc64le", "product_id": "tomcat10-webapps-10.1.35-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.35-1.1.s390x", "product": { "name": "tomcat10-10.1.35-1.1.s390x", "product_id": "tomcat10-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.35-1.1.s390x", "product": { "name": "tomcat10-admin-webapps-10.1.35-1.1.s390x", "product_id": "tomcat10-admin-webapps-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.35-1.1.s390x", "product": { "name": "tomcat10-doc-10.1.35-1.1.s390x", "product_id": "tomcat10-doc-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.35-1.1.s390x", "product": { "name": "tomcat10-docs-webapp-10.1.35-1.1.s390x", "product_id": "tomcat10-docs-webapp-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.35-1.1.s390x", "product": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.s390x", "product_id": "tomcat10-el-5_0-api-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.35-1.1.s390x", "product": { "name": "tomcat10-embed-10.1.35-1.1.s390x", "product_id": "tomcat10-embed-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "product": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "product_id": "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.35-1.1.s390x", "product": { "name": "tomcat10-jsvc-10.1.35-1.1.s390x", "product_id": "tomcat10-jsvc-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.35-1.1.s390x", "product": { "name": "tomcat10-lib-10.1.35-1.1.s390x", "product_id": "tomcat10-lib-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "product": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "product_id": "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.35-1.1.s390x", "product": { "name": "tomcat10-webapps-10.1.35-1.1.s390x", "product_id": "tomcat10-webapps-10.1.35-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-10.1.35-1.1.x86_64", "product_id": "tomcat10-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-admin-webapps-10.1.35-1.1.x86_64", "product_id": "tomcat10-admin-webapps-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-doc-10.1.35-1.1.x86_64", "product_id": "tomcat10-doc-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-docs-webapp-10.1.35-1.1.x86_64", "product_id": "tomcat10-docs-webapp-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "product_id": "tomcat10-el-5_0-api-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-embed-10.1.35-1.1.x86_64", "product_id": "tomcat10-embed-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "product_id": "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-jsvc-10.1.35-1.1.x86_64", "product_id": "tomcat10-jsvc-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-lib-10.1.35-1.1.x86_64", "product_id": "tomcat10-lib-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "product_id": "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.35-1.1.x86_64", "product": { "name": "tomcat10-webapps-10.1.35-1.1.x86_64", "product_id": "tomcat10-webapps-10.1.35-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-admin-webapps-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-admin-webapps-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-admin-webapps-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-doc-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-doc-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-doc-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-doc-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-docs-webapp-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-docs-webapp-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-docs-webapp-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-el-5_0-api-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-embed-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-embed-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-embed-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-embed-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-jsvc-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-jsvc-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-jsvc-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-jsvc-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-lib-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-lib-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-lib-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-lib-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64" }, "product_reference": "tomcat10-webapps-10.1.35-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le" }, "product_reference": "tomcat10-webapps-10.1.35-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x" }, "product_reference": "tomcat10-webapps-10.1.35-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64" }, "product_reference": "tomcat10-webapps-10.1.35-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56337" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56337", "url": "https://www.suse.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1234663" }, { "category": "external", "summary": "SUSE Bug 1236809 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1236809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-03-15T00:00:00Z", "details": "important" } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-24813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24813" } ], "notes": [ { "category": "general", "text": "Path Equivalence: \u0027file.Name\u0027 (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat\u0027s file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24813", "url": "https://www.suse.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "SUSE Bug 1239302 for CVE-2025-24813", "url": "https://bugzilla.suse.com/1239302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-03-15T00:00:00Z", "details": "important" } ], "title": "CVE-2025-24813" } ] }
suse-su-2025:1024-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat10", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat10 fixes the following issues:\n\n- CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with\n partial PUT (bsc#1239302)\n\nOther fixes:\n\n- Update to Tomcat 10.1.39\n * Fixes:\n + launch with java 17 (bsc#1239676)\n * Catalina\n + Fix: 69602: Fix regression in releases from 12-2024 that were too strict\n and rejected weak etags in the If-Range header with a 400 response.\n Instead will consider it as a failed match since strong etags are required\n for If-Range. (remm)\n + Fix: When looking up class loader resources by resource name, the resource\n name should not start with \u0027/\u0027. If the resource name does start with \u0027/\u0027,\n Tomcat is lenient and looks it up as if the \u0027/\u0027 was not present. When the\n web application class loader was configured with external repositories and\n names starting with \u0027/\u0027 were used for lookups, it was possible that cached\n \u0027not found\u0027 results could effectively hide lookup results using the\n correct resource name. (markt)\n + Fix: Enable the JNDIRealm to validate credentials provided to\n HttpServletRequest.login(String username, String password) when the realm\n is configured to use GSSAPI authentication. (markt)\n + Fix: Fix a bug in the JRE compatibility detection that incorrectly\n identified Java 19 and Java 20 as supporting Java 21 features. (markt)\n + Fix: Improve the checks for exposure to and protection against\n CVE-2024-56337 so that reflection is not used unless required. The checks\n for whether the file system is case sensitive or not have been removed.\n (markt)\n + Add: Add support for logging the connection ID (as returned by\n ServletRequest.getServletConnection().getConnectionId()) with the\n AccessLogValve and ExtendedAccessLogValve. Based on pull request #814 by\n Dmole. (markt)\n + Fix: Avoid scenarios where temporary files used for partial PUT would not\n be deleted. (remm)\n + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught\n exception introduced for the check for CVE-2024-56337. (remm)\n * Cluster\n + Add: 69598: Add detection of service account token changes to the\n KubernetesMembershipProvider implementation and reload the token if it\n changes. Based on a patch by Miroslav Jezbera. (markt)\n * Coyote\n + Fix: 69575: Avoid using compression if a response is already compressed\n using compress, deflate or zstd. (remm)\n + Update: Use Transfer-Encoding for compression rather than Content-Encoding\n if the client submits a TE header containing gzip. (remm)\n + Fix: Fix a race condition in the handling of HTTP/2 stream reset that\n could cause unexpected 500 responses. (markt)\n * Other\n + Add: Add makensis as an option for building the Installer for Windows on\n non-Windows platforms. (rjung/markt)\n + Update: Update Byte Buddy to 1.17.1. (markt)\n + Update: Update Checkstyle to 10.21.3. (markt)\n + Update: Update SpotBugs to 4.9.1. (markt)\n + Update: Update JSign to 7.1. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON\n documents. (remm) \n\n- Update to Tomcat 10.1.35\n * Catalina\n + Update: Add tableName configuration on the DataSourcePropertyStore that\n may be used by the WebDAV Servlet. (remm)\n + Update: Improve HTTP If headers processing according to RFC 9110. Based on\n pull request #796 by Chenjp. (remm/markt)\n + Update: Allow readOnly attribute configuration on the Resources element\n and allow configure the readOnly attribute value of the main resources.\n The attribute value will also be used by the default and WebDAV Servlets.\n (remm)\n + Fix: 69285: Optimise the creation of the parameter map for included\n requests. Based on sample code and test cases provided by John\n Engebretson. (markt)\n + Fix: 69527: Avoid rare cases where a cached resource could be set with 0\n content length, or could be evicted immediately. (remm)\n + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect\n requests without body for WebDAV LOCK and PROPFIND. (remm)\n + Fix: 69528: Add multi-release JAR support for the bloom\n archiveIndexStrategy of the Resources. (remm)\n + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based\n on a patch submitted by Chenjp. (remm)\n + Fix: Remove unused session to client map from CrawlerSessionManagerValve.\n Submitted by Brian Matzon. (remm)\n + Add: Add a check to ensure that, if one or more web applications are\n potentially vulnerable to CVE-2024-56337, the JVM has been configured to\n protect against the vulnerability and to configure the JVM correctly if\n not. Where one or more web applications are potentially vulnerable to\n CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be\n confirmed that the JVM has been correctly configured, prevent the impacted\n web applications from starting. (markt)\n + Fix: When using the WebDAV servlet with serveSubpathOnly set to true,\n ensure that the destination for any requested WebDAV operation is also\n restricted to the sub-path. (markt)\n + Fix: Generate an appropriate Allow HTTP header when the Default servlet\n returns a 405 (method not allowed) response in response to a DELETE\n request because the target resource cannot be deleted. Pull request #802\n provided by Chenjp. (markt)\n + Code: Refactor creation of RequestDispatcher instances so that the\n processing of the provided path is consistent with normal request\n processing. (markt)\n + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling\n attributes to Context to provide control over the handling of the path\n used to created a RequestDispatcher. (markt)\n + Fix: Handle a potential NullPointerException after an IOException occurs\n on a non-container thread during asynchronous processing. (markt)\n + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)\n * Coyote\n + Fix: Don\u0027t log warnings for registered HTTP/2 settings that Tomcat does\n not support. These settings are now silently ignored. (markt)\n + Fix: Avoid a rare NullPointerException when recycling the\n Http11InputBuffer. (markt)\n + Fix: Lower the log level to debug for logging an invalid socket channel\n when processing poller events for the NIO Connector as this may occur in\n normal usage. (markt)\n + Code: Clean-up references to the HTTP/2 stream once request processing has\n completed to aid GC and reduce the size of the HTTP/2 recycled request and\n response cache. (markt)\n + Add: Add a new Connector configuration attribute,\n encodedReverseSolidusHandling, to control how %5c sequences in URLs are\n handled. The default behaviour is unchanged (decode) keeping in mind that\n the allowBackslash attribute determines how the decoded URI is processed.\n (markt)\n + Fix: 69545: Improve CRLF skipping for the available method of the\n ChunkedInputFilter. (remm)\n + Fix: Improve the performance of repeated calls to getHeader(). Pull\n request #813 provided by Adwait Kumar Singh. (markt)\n + Fix: 69559: Ensure that the Java 24 warning regarding the use of\n sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code\n will be used. (markt)\n * Jasper\n + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP\n include actions if both the page attribute and the body contained\n parameters. Pull request #803 provided by Chenjp. (markt)\n + Fix: Update the identifier validation in the Expression Language parser to\n reflect that, as of Java 9, _ is also a Java keyword and may not be used\n as an identifier. (markt)\n + Fix: 69521: Update the EL Parser to allow the full range of valid\n characters in an EL identifier as defined by the Java Language\n Specification. (markt)\n + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch\n provided by John Engebretson. (markt)\n * Web applications\n + Add: Documentation. Expand the description of the security implications of\n setting mapperContextRootRedirectEnabled and/or\n mapperDirectoryRedirectEnabled to true. (markt)\n + Fix: Documentation. Better document the default for the truststoreProvider\n attribute of a SSLHostConfig element. (markt)\n * Other\n + Update: Update to Commons Daemon 1.4.1. (markt)\n + Update: Update the packaged version of the Tomcat Migration Tool for\n Jakarta EE to 1.0.9. (markt)\n + Update: Update the internal fork of Commons Pool to 2.12.1. (markt)\n + Update: Update Byte Buddy to 1.16.1. (markt)\n + Update: Update UnboundID to 7.0.2. (markt)\n + Update: Update Checkstyle to 10.21.2. (markt)\n + Update: Update SpotBugs to 4.9.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Chinese translations by leeyazhou. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt) \n + Add: Improvements to Japanese translations by tak7iji. (markt)", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-1024,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1024,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1024,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1024,openSUSE-SLE-15.6-2025-1024", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1024-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:1024-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251024-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:1024-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020602.html" }, { "category": "self", "summary": "SUSE Bug 1239302", "url": "https://bugzilla.suse.com/1239302" }, { "category": "self", "summary": "SUSE Bug 1239676", "url": "https://bugzilla.suse.com/1239676" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56337 page", "url": "https://www.suse.com/security/cve/CVE-2024-56337/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24813 page", "url": "https://www.suse.com/security/cve/CVE-2025-24813/" } ], "title": "Security update for tomcat10", "tracking": { "current_release_date": "2025-03-26T11:29:12Z", "generator": { "date": "2025-03-26T11:29:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:1024-1", "initial_release_date": "2025-03-26T11:29:12Z", "revision_history": [ { "date": "2025-03-26T11:29:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-doc-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-doc-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-embed-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-embed-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-lib-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "product": { "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "product_id": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-doc-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-embed-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-lib-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56337" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56337", "url": "https://www.suse.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1234663" }, { "category": "external", "summary": "SUSE Bug 1236809 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1236809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-03-26T11:29:12Z", "details": "important" } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-24813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24813" } ], "notes": [ { "category": "general", "text": "Path Equivalence: \u0027file.Name\u0027 (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat\u0027s file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24813", "url": "https://www.suse.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "SUSE Bug 1239302 for CVE-2025-24813", "url": "https://bugzilla.suse.com/1239302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-03-26T11:29:12Z", "details": "important" } ], "title": "CVE-2025-24813" } ] }
suse-su-2025:1126-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat fixes the following issues:\n\n- CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with partial PUT (bsc#1239302)\n\n- Update to Tomcat 9.0.102\n * Fixes:\n + launch with java 17 (bsc#1239676)\n * Catalina\n + Fix: Weak etags in the If-Range header should not match as strong etags\n are required. (remm)\n + Fix: When looking up class loader resources by resource name, the resource\n name should not start with \u0027/\u0027. If the resource name does start with \u0027/\u0027,\n Tomcat is lenient and looks it up as if the \u0027/\u0027 was not present. When the\n web application class loader was configured with external repositories and\n names starting with \u0027/\u0027 were used for lookups, it was possible that cached\n \u0027not found\u0027 results could effectively hide lookup results using the\n correct resource name. (markt)\n + Fix: Enable the JNDIRealm to validate credentials provided to\n HttpServletRequest.login(String username, String password) when the realm\n is configured to use GSSAPI authentication. (markt)\n + Fix: Fix a bug in the JRE compatibility detection that incorrectly\n identified Java 19 and Java 20 as supporting Java 21 features. (markt)\n + Fix: Improve the checks for exposure to and protection against\n CVE-2024-56337 so that reflection is not used unless required. The checks\n for whether the file system is case sensitive or not have been removed.\n (markt)\n + Fix: Avoid scenarios where temporary files used for partial PUT would not\n be deleted. (remm)\n + Fix: 69602: Fix regression in releases from 12-2024 that were too strict\n and rejected weak etags in the If-Range header. (remm)\n + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught\n exception introduced for the check for CVE-2024-56337. (remm)\n * Cluster\n + Add: 69598: Add detection of service account token changes to the\n KubernetesMembershipProvider implementation and reload the token if it\n changes. Based on a patch by Miroslav Jezbera. (markt)\n * Coyote\n + Fix: 69575: Avoid using compression if a response is already compressed\n using compress, deflate or zstd. (remm)\n + Update: Use Transfer-Encoding for compression rather than Content-Encoding\n if the client submits a TE header containing gzip. (remm)\n + Fix: Fix a race condition in the handling of HTTP/2 stream reset that\n could cause unexpected 500 responses. (markt)\n * Other\n + Add: Add makensis as an option for building the Installer for Windows on\n non-Windows platforms. (rjung/markt)\n + Update: Update Byte Buddy to 1.17.1. (markt)\n + Update: Update Checkstyle to 10.21.3. (markt)\n + Update: Update SpotBugs to 4.9.1. (markt)\n + Update: Update JSign to 7.1. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON\n documents. (remm) \n\n- Update to Tomcat 9.0.99\n * Catalina\n + Update: Add tableName configuration on the DataSourcePropertyStore that\n may be used by the WebDAV Servlet. (remm)\n + Update: Improve HTTP If headers processing according to RFC 9110. Based on\n pull request #796 by Chenjp. (remm/markt)\n + Update: Allow readOnly attribute configuration on the Resources element\n and allow configure the readOnly attribute value of the main resources.\n The attribute value will also be used by the default and WebDAV Servlets.\n (remm)\n + Fix: 69285: Optimise the creation of the parameter map for included\n requests. Based on sample code and test cases provided by John\n Engebretson. (markt)\n + Fix: 69527: Avoid rare cases where a cached resource could be set with 0\n content length, or could be evicted immediately. (remm)\n + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect\n requests without body for WebDAV LOCK and PROPFIND. (remm)\n + Fix: 69528: Add multi-release JAR support for the bloom\n archiveIndexStrategy of the Resources. (remm)\n + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based\n on a patch submitted by Chenjp. (remm)\n + Add: Add a check to ensure that, if one or more web applications are\n potentially vulnerable to CVE-2024-56337, the JVM has been configured to\n protect against the vulnerability and to configure the JVM correctly if\n not. Where one or more web applications are potentially vulnerable to\n CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be\n confirmed that the JVM has been correctly configured, prevent the impacted\n web applications from starting. (markt)\n + Fix: Remove unused session to client map from CrawlerSessionManagerValve.\n Submitted by Brian Matzon. (remm)\n + Fix: When using the WebDAV servlet with serveSubpathOnly set to true,\n ensure that the destination for any requested WebDAV operation is also\n restricted to the sub-path. (markt)\n + Fix: Generate an appropriate Allow HTTP header when the Default servlet\n returns a 405 (method not allowed) response in response to a DELETE\n request because the target resource cannot be deleted. Pull request #802\n provided by Chenjp. (markt)\n + Code: Refactor creation of RequestDispatcher instances so that the\n processing of the provided path is consistent with normal request\n processing. (markt)\n + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling\n attributes to Context to provide control over the handling of the path\n used to created a RequestDispatcher. (markt)\n + Fix: Handle a potential NullPointerException after an IOException occurs\n on a non-container thread during asynchronous processing. (markt)\n + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)\n * Coyote\n + Fix: Don\u0027t log warnings for registered HTTP/2 settings that Tomcat does\n not support. These settings are now silently ignored. (markt)\n + Fix: Avoid a rare NullPointerException when recycling the\n Http11InputBuffer. (markt)\n + Fix: Lower the log level to debug for logging an invalid socket channel\n when processing poller events for the NIO Connector as this may occur in\n normal usage. (markt)\n + Code: Clean-up references to the HTTP/2 stream once request processing has\n completed to aid GC and reduce the size of the HTTP/2 recycled request and\n response cache. (markt)\n + Add: Add a new Connector configuration attribute,\n encodedReverseSolidusHandling, to control how %5c sequences in URLs are\n handled. The default behaviour is unchanged (decode) keeping in mind that\n the allowBackslash attribute determines how the decoded URI is processed.\n (markt)\n + Fix: 69545: Improve CRLF skipping for the available method of the\n ChunkedInputFilter. (remm)\n + Fix: Improve the performance of repeated calls to getHeader(). Pull\n request #813 provided by Adwait Kumar Singh. (markt)\n + Fix: 69559: Ensure that the Java 24 warning regarding the use of\n sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code\n will be used. (markt)\n * Jasper\n + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP\n include actions if both the page attribute and the body contained\n parameters. Pull request #803 provided by Chenjp. (markt)\n + Fix: 69521: Update the EL Parser to allow the full range of valid\n characters in an EL identifier as defined by the Java Language\n Specification. (markt)\n + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch\n provided by John Engebretson. (markt)\n * Web applications\n + Add: Documentation. Expand the description of the security implications of\n setting mapperContextRootRedirectEnabled and/or\n mapperDirectoryRedirectEnabled to true. (markt)\n + Fix: Documentation. Better document the default for the truststoreProvider\n attribute of a SSLHostConfig element. (markt)\n * Other\n + Update: Update to Commons Daemon 1.4.1. (markt)\n + Update: Update the internal fork of Commons Pool to 2.12.1. (markt)\n + Update: Update Byte Buddy to 1.16.1. (markt)\n + Update: Update UnboundID to 7.0.2. (markt)\n + Update: Update Checkstyle to 10.21.2. (markt)\n + Update: Update SpotBugs to 4.9.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Chinese translations by leeyazhou. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-1126,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1126,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1126,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1126,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1126,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1126,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1126,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1126,SUSE-Storage-7.1-2025-1126,openSUSE-SLE-15.6-2025-1126", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1126-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:1126-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251126-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:1126-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-April/038899.html" }, { "category": "self", "summary": "SUSE Bug 1239302", "url": "https://bugzilla.suse.com/1239302" }, { "category": "self", "summary": "SUSE Bug 1239676", "url": "https://bugzilla.suse.com/1239676" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56337 page", "url": "https://www.suse.com/security/cve/CVE-2024-56337/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24813 page", "url": "https://www.suse.com/security/cve/CVE-2025-24813/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2025-04-03T11:51:06Z", "generator": { "date": "2025-04-03T11:51:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:1126-1", "initial_release_date": "2025-04-03T11:51:06Z", "revision_history": [ { "date": "2025-04-03T11:51:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-9.0.102-150200.78.1.noarch", "product_id": "tomcat-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "product_id": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "product_id": "tomcat-docs-webapp-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "product_id": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-embed-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-embed-9.0.102-150200.78.1.noarch", "product_id": "tomcat-embed-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-javadoc-9.0.102-150200.78.1.noarch", "product_id": "tomcat-javadoc-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "product_id": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-jsvc-9.0.102-150200.78.1.noarch", "product_id": "tomcat-jsvc-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-lib-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch", "product_id": "tomcat-lib-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "product_id": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.102-150200.78.1.noarch", "product": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch", "product_id": "tomcat-webapps-9.0.102-150200.78.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-embed-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-javadoc-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-jsvc-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-lib-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch" }, "product_reference": "tomcat-webapps-9.0.102-150200.78.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56337" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56337", "url": "https://www.suse.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1234663" }, { "category": "external", "summary": "SUSE Bug 1236809 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1236809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-04-03T11:51:06Z", "details": "important" } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-24813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24813" } ], "notes": [ { "category": "general", "text": "Path Equivalence: \u0027file.Name\u0027 (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat\u0027s file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24813", "url": "https://www.suse.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "SUSE Bug 1239302 for CVE-2025-24813", "url": "https://bugzilla.suse.com/1239302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-04-03T11:51:06Z", "details": "important" } ], "title": "CVE-2025-24813" } ] }
suse-su-2025:0033-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat10", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat10 fixes the following issues:\n\nUpdate to Tomcat 10.1.34\n\n- Fixed CVEs:\n + CVE-2024-54677: DoS in examples web application (bsc#1234664)\n + CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663) \n + CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)\n + CVE-2024-56337: RCE due to TOCTOU issue in JSP compilation - mitigation was incomplete\n- Catalina\n + Add: Add option to serve resources from subpath only with WebDAV Servlet\n like with DefaultServlet. (michaelo)\n + Fix: Add special handling for the protocols attribute of SSLHostConfig in\n storeconfig. (remm)\n + Fix: 69442: Fix case sensitive check on content-type when parsing request\n parameters. (remm)\n + Code: Refactor duplicate code for extracting media type and subtype from\n content-type into a single method. (markt)\n + Fix: Compatibility of generated embedded code with components where\n constructors or property related methods throw a checked exception. (remm)\n + Fix: The previous fix for inconsistent resource metadata during concurrent\n reads and writes was incomplete. (markt)\n + Fix: #780: Fix content-range header length. Submitted by Chenjp. (remm)\n + Fix: 69444: Ensure that the jakarta.servlet.error.message request\n attribute is set when an application defined error page is called. (markt)\n + Fix: Avoid quotes for numeric values in the JSON generated by the status\n servlet. (remm)\n + Add: Add strong ETag support for the WebDAV and default servlet, which can\n be enabled by using the useStrongETags init parameter with a value set to\n true. The ETag generated will be a SHA-1 checksum of the resource content.\n (remm)\n + Fix: Use client locale for directory listings. (remm)\n + Fix: 69439: Improve the handling of multiple Cache-Control headers in the\n ExpiresFilter. Based on pull request #777 by Chenjp. (markt)\n + Fix: 69447: Update the support for caching classes the web application\n class loader cannot find to take account of classes loaded from external\n repositories. Prior to this fix, these classes could be incorrectly marked\n as not found. (markt)\n + Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by\n users will not be removed and any header present in a HEAD request will\n also be present in the equivalent GET request. There may be some headers,\n as per RFC 9110, section 9.3.2, that are present in a GET request that are\n not present in the equivalent HEAD request. (markt)\n + Fix: 69471: Log instances of CloseNowException caught by\n ApplicationDispatcher.invoke() at debug level rather than error level as\n they are very likely to have been caused by a client disconnection or\n similar I/O issue. (markt)\n + Add: Add a test case for the fix for 69442. Also refactor references to\n application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.\n (markt)\n + Fix: 69476: Catch possible ISE when trying to report PUT failure in the\n DefaultServlet. (remm)\n + Add: Add support for RateLimit header fields for HTTP (draft) in the\n RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)\n + Add: #787: Add regression tests for 69478. Pull request provided by Thomas\n Krisch. (markt)\n + Fix: The default servlet now rejects HTTP range requests when two or more\n of the requested ranges overlap. Based on pull request #782 provided by\n Chenjp. (markt)\n + Fix: Enhance Content-Range verification for partial PUT requests handled\n by the default servlet. Provided by Chenjp in pull request #778. (markt)\n + Fix: Harmonize DataSourceStore lookup in the global resources to\n optionally avoid the comp/env prefix which is usually not used there.\n (remm)\n + Fix: As required by RFC 9110, the HTTP Range header will now only be\n processed for GET requests. Based on pull request #790 provided by Chenjp.\n (markt)\n + Fix: Deprecate the useAcceptRanges initialisation parameter for the\n default servlet. It will be removed in Tomcat 12 onwards where it will\n effectively be hard coded to true. (markt)\n + Add: Add DataSource based property storage for the WebdavServlet. (remm)\n- Coyote\n + Fix: Align encodedSolidusHandling with the Servlet specification. If the\n pass-through mode is used, any %25 sequences will now also be passed\n through to avoid errors and/or corruption when the application decodes the\n path. (markt)\n- Jasper\n + Fix: Follow-up to the fix for 69381. Apply the optimisation for method\n lookup performance in expression language to an additional location.\n (markt)\n- Web applications\n + Fix: Documentation. Remove references to the ResourceParams element.\n Support for ResourceParams was removed in Tomcat 5.5.x. (markt)\n + Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter.\n The attribute is internalProxies rather than allowedInternalProxies. Pull\n request #786 (markt)\n + Fix: Examples. Fix broken links when Servlet Request Info example is\n called via a URL that includes a pathInfo component. (markt)\n + Fix: Examples. Expand the obfuscation of session cookie values in the\n request header example to JSON responses. (markt)\n + Add: Examples. Add the ability to delete session attributes in the servlet\n session example. (markt)\n + Add: Examples. Add a hard coded limit of 10 attributes per session for the\n servlet session example. (markt)\n + Add: Examples. Add the ability to delete session attributes and add a hard\n coded limit of 10 attributes per session for the JSP form authentication\n example. (markt)\n + Add: Examples. Limit the shopping cart example to only allow adding the\n pre-defined items to the cart. (markt)\n + Fix: Examples. Remove JSP calendar example. (markt)\n- Other\n + Fix: 69465: Fix warnings during native image compilation using the Tomcat\n embedded JARs. (markt)\n + Update: Update Tomcat\u0027s fork of Commons DBCP to 2.13.0. (markt)\n + Update: Update EasyMock to 5.5.0. (markt)\n + Update: Update Checkstyle to 10.20.2. (markt)\n + Update: Update BND to 7.1.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Korean translations. (markt)\n + Add: Improvements to Chinese translations. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt) \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-33,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-33,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-33,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-33,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-33,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-33,openSUSE-SLE-15.6-2025-33", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0033-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0033-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250033-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0033-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020069.html" }, { "category": "self", "summary": "SUSE Bug 1233435", "url": "https://bugzilla.suse.com/1233435" }, { "category": "self", "summary": "SUSE Bug 1234663", "url": "https://bugzilla.suse.com/1234663" }, { "category": "self", "summary": "SUSE Bug 1234664", "url": "https://bugzilla.suse.com/1234664" }, { "category": "self", "summary": "SUSE Bug 1236809", "url": "https://bugzilla.suse.com/1236809" }, { "category": "self", "summary": "SUSE CVE CVE-2024-50379 page", "url": "https://www.suse.com/security/cve/CVE-2024-50379/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52317 page", "url": "https://www.suse.com/security/cve/CVE-2024-52317/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54677 page", "url": "https://www.suse.com/security/cve/CVE-2024-54677/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56337 page", "url": "https://www.suse.com/security/cve/CVE-2024-56337/" } ], "title": "Security update for tomcat10", "tracking": { "current_release_date": "2025-02-05T10:33:06Z", "generator": { "date": "2025-02-05T10:33:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0033-1", "initial_release_date": "2025-02-05T10:33:06Z", "revision_history": [ { "date": "2025-02-05T10:33:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-doc-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-doc-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-embed-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-embed-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-lib-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "product": { "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "product_id": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-doc-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-embed-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-lib-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-50379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-50379" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-50379", "url": "https://www.suse.com/security/cve/CVE-2024-50379" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-50379", "url": "https://bugzilla.suse.com/1234663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:33:06Z", "details": "important" } ], "title": "CVE-2024-50379" }, { "cve": "CVE-2024-52317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52317" } ], "notes": [ { "category": "general", "text": "Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52317", "url": "https://www.suse.com/security/cve/CVE-2024-52317" }, { "category": "external", "summary": "SUSE Bug 1233435 for CVE-2024-52317", "url": "https://bugzilla.suse.com/1233435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:33:06Z", "details": "moderate" } ], "title": "CVE-2024-52317" }, { "cve": "CVE-2024-54677", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54677" } ], "notes": [ { "category": "general", "text": "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54677", "url": "https://www.suse.com/security/cve/CVE-2024-54677" }, { "category": "external", "summary": "SUSE Bug 1234664 for CVE-2024-54677", "url": "https://bugzilla.suse.com/1234664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:33:06Z", "details": "important" } ], "title": "CVE-2024-54677" }, { "cve": "CVE-2024-56337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56337" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56337", "url": "https://www.suse.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1234663" }, { "category": "external", "summary": "SUSE Bug 1236809 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1236809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:33:06Z", "details": "important" } ], "title": "CVE-2024-56337" } ] }
suse-su-2025:0058-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat fixes the following issues:\n\nUpdate to Tomcat 9.0.98\n\n- Fixed CVEs:\n + CVE-2024-54677: DoS in examples web application (bsc#1234664)\n + CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663)\n + CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)\n- Catalina\n + Add: Add option to serve resources from subpath only with WebDAV Servlet\n like with DefaultServlet. (michaelo)\n + Fix: Add special handling for the protocols attribute of SSLHostConfig in\n storeconfig. (remm)\n + Fix: 69442: Fix case sensitive check on content-type when parsing request\n parameters. (remm)\n + Code: Refactor duplicate code for extracting media type and subtype from\n content-type into a single method. (markt)\n + Fix: Compatibility of generated embedded code with components where\n constructors or property related methods throw a checked exception. (remm)\n + Fix: The previous fix for inconsistent resource metadata during concurrent\n reads and writes was incomplete. (markt)\n + Fix: 69444: Ensure that the javax.servlet.error.message request attribute\n is set when an application defined error page is called. (markt)\n + Fix: Avoid quotes for numeric values in the JSON generated by the status\n servlet. (remm)\n + Add: Add strong ETag support for the WebDAV and default servlet, which can\n be enabled by using the useStrongETags init parameter with a value set to\n true. The ETag generated will be a SHA-1 checksum of the resource content.\n (remm)\n + Fix: Use client locale for directory listings. (remm)\n + Fix: 69439: Improve the handling of multiple Cache-Control headers in the\n ExpiresFilter. Based on pull request #777 by Chenjp. (markt)\n + Fix: 69447: Update the support for caching classes the web application\n class loader cannot find to take account of classes loaded from external\n repositories. Prior to this fix, these classes could be incorrectly marked\n as not found. (markt)\n + Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by\n users will not be removed and any header present in a HEAD request will\n also be present in the equivalent GET request. There may be some headers,\n as per RFC 9110, section 9.3.2, that are present in a GET request that are\n not present in the equivalent HEAD request. (markt)\n + Fix: 69471: Log instances of CloseNowException caught by\n ApplicationDispatcher.invoke() at debug level rather than error level as\n they are very likely to have been caused by a client disconnection or\n similar I/O issue. (markt)\n + Add: Add a test case for the fix for 69442. Also refactor references to\n application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.\n (markt)\n + Fix: 69476: Catch possible ISE when trying to report PUT failure in the\n DefaultServlet. (remm)\n + Add: Add support for RateLimit header fields for HTTP (draft) in the\n RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)\n + Add: #787: Add regression tests for 69478. Pull request provided by Thomas\n Krisch. (markt)\n + Fix: The default servlet now rejects HTTP range requests when two or more\n of the requested ranges overlap. Based on pull request #782 provided by\n Chenjp. (markt)\n + Fix: Enhance Content-Range verification for partial PUT requests handled\n by the default servlet. Provided by Chenjp in pull request #778. (markt)\n + Fix: Harmonize DataSourceStore lookup in the global resources to\n optionally avoid the comp/env prefix which is usually not used there.\n (remm)\n + Fix: As required by RFC 9110, the HTTP Range header will now only be\n processed for GET requests. Based on pull request #790 provided by Chenjp.\n (markt)\n + Fix: Deprecate the useAcceptRanges initialisation parameter for the\n default servlet. It will be removed in Tomcat 12 onwards where it will\n effectively be hard coded to true. (markt)\n + Add: Add DataSource based property storage for the WebdavServlet. (remm)\n- Coyote\n + Fix: Align encodedSolidusHandling with the Servlet specification. If the\n pass-through mode is used, any %25 sequences will now also be passed\n through to avoid errors and/or corruption when the application decodes the\n path. (markt)\n- Jasper\n + Fix: Further optimise EL evaluation of method parameters. Patch provided\n by Paolo B. (markt)\n + Fix: Follow-up to the fix for 69381. Apply the optimisation for method\n lookup performance in expression language to an additional location.\n (markt)\n- Web applications\n + Fix: Documentation. Remove references to the ResourceParams element.\n Support for ResourceParams was removed in Tomcat 5.5.x. (markt)\n + Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter.\n The attribute is internalProxies rather than allowedInternalProxies. Pull\n request #786 (markt)\n + Fix: Examples. Fix broken links when Servlet Request Info example is\n called via a URL that includes a pathInfo component. (markt)\n + Fix: Examples. Expand the obfuscation of session cookie values in the\n request header example to JSON responses. (markt)\n + Add: Examples. Add the ability to delete session attributes in the servlet\n session example. (markt)\n + Add: Examples. Add a hard coded limit of 10 attributes per session for the\n servlet session example. (markt)\n + Add: Examples. Add the ability to delete session attributes and add a hard\n coded limit of 10 attributes per session for the JSP form authentication\n example. (markt)\n + Add: Examples. Limit the shopping cart example to only allow adding the\n pre-defined items to the cart. (markt)\n + Fix: Examples. Remove JSP calendar example. (markt)\n- Other\n + Fix: 69465: Fix warnings during native image compilation using the Tomcat\n embedded JARs. (markt)\n + Update: Update Tomcat\u0027s fork of Commons DBCP to 2.13.0. (markt)\n + Update: Update EasyMock to 5.5.0. (markt)\n + Update: Update Checkstyle to 10.20.2. (markt)\n + Update: Update BND to 7.1.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Korean translations. (markt)\n + Add: Improvements to Chinese translations. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-58,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-58,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-58,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-58,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-58,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-58,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-58,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-58,SUSE-Storage-7.1-2025-58,openSUSE-SLE-15.6-2025-58", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0058-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0058-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250058-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0058-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020086.html" }, { "category": "self", "summary": "SUSE Bug 1233435", "url": "https://bugzilla.suse.com/1233435" }, { "category": "self", "summary": "SUSE Bug 1234663", "url": "https://bugzilla.suse.com/1234663" }, { "category": "self", "summary": "SUSE Bug 1234664", "url": "https://bugzilla.suse.com/1234664" }, { "category": "self", "summary": "SUSE Bug 1236809", "url": "https://bugzilla.suse.com/1236809" }, { "category": "self", "summary": "SUSE CVE CVE-2024-50379 page", "url": "https://www.suse.com/security/cve/CVE-2024-50379/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52317 page", "url": "https://www.suse.com/security/cve/CVE-2024-52317/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54677 page", "url": "https://www.suse.com/security/cve/CVE-2024-54677/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56337 page", "url": "https://www.suse.com/security/cve/CVE-2024-56337/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2025-02-05T10:34:01Z", "generator": { "date": "2025-02-05T10:34:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0058-1", "initial_release_date": "2025-02-05T10:34:01Z", "revision_history": [ { "date": "2025-02-05T10:34:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-9.0.98-150200.74.1.noarch", "product_id": "tomcat-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "product_id": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "product_id": "tomcat-docs-webapp-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "product_id": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-embed-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-embed-9.0.98-150200.74.1.noarch", "product_id": "tomcat-embed-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-javadoc-9.0.98-150200.74.1.noarch", "product_id": "tomcat-javadoc-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "product_id": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-jsvc-9.0.98-150200.74.1.noarch", "product_id": "tomcat-jsvc-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-lib-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch", "product_id": "tomcat-lib-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "product_id": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.98-150200.74.1.noarch", "product": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch", "product_id": "tomcat-webapps-9.0.98-150200.74.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-embed-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-javadoc-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-jsvc-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-lib-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" }, "product_reference": "tomcat-webapps-9.0.98-150200.74.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-50379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-50379" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-50379", "url": "https://www.suse.com/security/cve/CVE-2024-50379" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-50379", "url": "https://bugzilla.suse.com/1234663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:34:01Z", "details": "important" } ], "title": "CVE-2024-50379" }, { "cve": "CVE-2024-52317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52317" } ], "notes": [ { "category": "general", "text": "Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52317", "url": "https://www.suse.com/security/cve/CVE-2024-52317" }, { "category": "external", "summary": "SUSE Bug 1233435 for CVE-2024-52317", "url": "https://bugzilla.suse.com/1233435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:34:01Z", "details": "moderate" } ], "title": "CVE-2024-52317" }, { "cve": "CVE-2024-54677", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54677" } ], "notes": [ { "category": "general", "text": "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54677", "url": "https://www.suse.com/security/cve/CVE-2024-54677" }, { "category": "external", "summary": "SUSE Bug 1234664 for CVE-2024-54677", "url": "https://bugzilla.suse.com/1234664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:34:01Z", "details": "important" } ], "title": "CVE-2024-54677" }, { "cve": "CVE-2024-56337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56337" } ], "notes": [ { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56337", "url": "https://www.suse.com/security/cve/CVE-2024-56337" }, { "category": "external", "summary": "SUSE Bug 1234663 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1234663" }, { "category": "external", "summary": "SUSE Bug 1236809 for CVE-2024-56337", "url": "https://bugzilla.suse.com/1236809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-05T10:34:01Z", "details": "important" } ], "title": "CVE-2024-56337" } ] }
wid-sec-w-2025-0819
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0819 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0819.json" }, { "category": "self", "summary": "WID-SEC-2025-0819 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0819" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2025 - Appendix Oracle Financial Services Applications vom 2025-04-15", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-04-15T22:00:00.000+00:00", "generator": { "date": "2025-04-16T09:16:23.001+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0819", "initial_release_date": "2025-04-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "8.0.8", "product": { "name": "Oracle Financial Services Applications 8.0.8", "product_id": "T021677", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8" } } }, { "category": "product_version", "name": "8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_version", "name": "21.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 21.1.0.0.0", "product_id": "T028695", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1.0.0.0" } } }, { "category": "product_version", "name": "22.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 22.1.0.0.0", "product_id": "T028696", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1.0.0.0" } } }, { "category": "product_version", "name": "22.2.0.0.0", "product": { "name": "Oracle Financial Services Applications 22.2.0.0.0", "product_id": "T028697", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2.0.0.0" } } }, { "category": "product_version", "name": "14.5.0.0.0-14.7.0.0.0", "product": { "name": "Oracle Financial Services Applications 14.5.0.0.0-14.7.0.0.0", "product_id": "T028702", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.0.0" } } }, { "category": "product_version", "name": "8.1.2.5", "product": { "name": "Oracle Financial Services Applications 8.1.2.5", "product_id": "T028706", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.5" } } }, { "category": "product_version", "name": "6.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 6.1.0.0.0", "product_id": "T036223", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:6.1.0.0.0" } } }, { "category": "product_version", "name": "8.1.2.8", "product": { "name": "Oracle Financial Services Applications 8.1.2.8", "product_id": "T038392", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.8" } } }, { "category": "product_version", "name": "7.0.0.0.0", "product": { "name": "Oracle Financial Services Applications 7.0.0.0.0", "product_id": "T040463", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:7.0.0.0.0" } } }, { "category": "product_version", "name": "8.0.7.8", "product": { "name": "Oracle Financial Services Applications 8.0.7.8", "product_id": "T040464", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8" } } }, { "category": "product_version", "name": "8.0.8.6", "product": { "name": "Oracle Financial Services Applications 8.0.8.6", "product_id": "T040465", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.6" } } }, { "category": "product_version", "name": "2.9.0.0.0-7.0.0.0.0", "product": { "name": "Oracle Financial Services Applications 2.9.0.0.0-7.0.0.0.0", "product_id": "T040516", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.0.0.0_-_7.0.0.0.0" } } }, { "category": "product_version", "name": "8.1.2.7.0", "product": { "name": "Oracle Financial Services Applications 8.1.2.7.0", "product_id": "T042808", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.7.0" } } }, { "category": "product_version", "name": "8.1.1.4", "product": { "name": "Oracle Financial Services Applications 8.1.1.4", "product_id": "T042809", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.4" } } }, { "category": "product_version", "name": "5.1.0.0.0", "product": { "name": "Oracle Financial Services Applications 5.1.0.0.0", "product_id": "T042810", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:5.1.0.0.0" } } }, { "category": "product_version", "name": "8.1.2.9", "product": { "name": "Oracle Financial Services Applications 8.1.2.9", "product_id": "T042811", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.9" } } }, { "category": "product_version", "name": "14.7.0.7.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.7.0", "product_id": "T042812", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.7.0" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-28170", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2021-28170" }, { "cve": "CVE-2023-39410", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-39410" }, { "cve": "CVE-2023-49582", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-49582" }, { "cve": "CVE-2024-28168", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-28168" }, { "cve": "CVE-2024-28219", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-28219" }, { "cve": "CVE-2024-35195", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-35195" }, { "cve": "CVE-2024-37891", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38819", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-38820" }, { "cve": "CVE-2024-38827", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-38827" }, { "cve": "CVE-2024-47072", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47554" }, { "cve": "CVE-2024-5206", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-5206" }, { "cve": "CVE-2024-56128", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-56128" }, { "cve": "CVE-2024-56337", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-56337" }, { "cve": "CVE-2024-57699", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-57699" }, { "cve": "CVE-2025-21573", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21573" }, { "cve": "CVE-2025-23184", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24970", "product_status": { "known_affected": [ "T040516", "T036223", "T042808", "T042809", "T021677", "T022844", "T028706", "T042810", "T042811", "T038392", "T042812", "T028702", "T028697", "T040465", "T040464", "T028695", "T040463", "T028696" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-24970" } ] }
wid-sec-w-2025-0808
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0808 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0808.json" }, { "category": "self", "summary": "WID-SEC-2025-0808 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0808" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2025 - Appendix Oracle Supply Chain vom 2025-04-15", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-04-15T22:00:00.000+00:00", "generator": { "date": "2025-04-16T09:15:59.629+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0808", "initial_release_date": "2025-04-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "6.2.1", "product": { "name": "Oracle Supply Chain 6.2.1", "product_id": "T040481", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.2.1" } } }, { "category": "product_version", "name": "12.2.6-12.2.14", "product": { "name": "Oracle Supply Chain 12.2.6-12.2.14", "product_id": "T042875", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.6_-_12.2.14" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37536", "product_status": { "known_affected": [ "T040481", "T042875" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-37536" }, { "cve": "CVE-2024-47554", "product_status": { "known_affected": [ "T040481", "T042875" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47554" }, { "cve": "CVE-2024-56337", "product_status": { "known_affected": [ "T040481", "T042875" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-56337" } ] }
wid-sec-w-2025-0719
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "SAP stellt unternehmensweite L\u00f6sungen f\u00fcr Gesch\u00e4ftsprozesse wie Buchf\u00fchrung, Vertrieb, Einkauf und Lagerhaltung zur Verf\u00fcgung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in SAP Software ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Cross-Site-Scripting-Angriffe durchzuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen preiszugeben und einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0719 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0719.json" }, { "category": "self", "summary": "WID-SEC-2025-0719 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0719" }, { "category": "external", "summary": "April Patch Day Notes vom 2025-04-07", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2025.html" }, { "category": "external", "summary": "April Patch Day Notes Update vom 2025-04-24", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2025.html" }, { "category": "external", "summary": "National Vulnerability Database CVE-2025-31324", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31324" }, { "category": "external", "summary": "Security Online vom 2025-04-24", "url": "https://securityonline.info/cve-2025-31324-cvss-10-zero-day-in-sap-netweaver-exploited-in-the-wild-to-deploy-webshells-and-c2-frameworks/" } ], "source_lang": "en-US", "title": "SAP Patchday April 2025: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-04-24T22:00:00.000+00:00", "generator": { "date": "2025-04-25T09:49:22.319+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0719", "initial_release_date": "2025-04-07T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-04-24T22:00:00.000+00:00", "number": "2", "summary": "Update von SAP - CVE-2025-31324 (ausgenutzt), CVE-2025-31327, CVE-2025-31328 erg\u00e4nzt" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "SAP Software", "product": { "name": "SAP Software", "product_id": "T042428", "product_identification_helper": { "cpe": "cpe:/a:sap:sap:-" } } } ], "category": "vendor", "name": "SAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2024-56337" }, { "cve": "CVE-2025-0064", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-0064" }, { "cve": "CVE-2025-23186", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-23186" }, { "cve": "CVE-2025-26653", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-26653" }, { "cve": "CVE-2025-26654", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-26654" }, { "cve": "CVE-2025-26657", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-26657" }, { "cve": "CVE-2025-27428", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-27428" }, { "cve": "CVE-2025-27429", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-27429" }, { "cve": "CVE-2025-27430", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-27430" }, { "cve": "CVE-2025-27435", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-27435" }, { "cve": "CVE-2025-27437", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-27437" }, { "cve": "CVE-2025-30013", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-30013" }, { "cve": "CVE-2025-30014", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-30014" }, { "cve": "CVE-2025-30015", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-30015" }, { "cve": "CVE-2025-30016", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-30016" }, { "cve": "CVE-2025-30017", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-30017" }, { "cve": "CVE-2025-31327", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-31327" }, { "cve": "CVE-2025-31328", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-31328" }, { "cve": "CVE-2025-31330", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-31330" }, { "cve": "CVE-2025-31331", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-31331" }, { "cve": "CVE-2025-31332", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-31332" }, { "cve": "CVE-2025-31333", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-31333" }, { "cve": "CVE-2025-31324", "product_status": { "known_affected": [ "T042428" ] }, "release_date": "2025-04-24T22:00:00.000+00:00", "title": "CVE-2025-31324" } ] }
wid-sec-w-2025-0148
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0148 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0148.json" }, { "category": "self", "summary": "WID-SEC-2025-0148 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0148" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2025 - Appendix Oracle Communications vom 2025-01-21", "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixCGBU" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-21T23:00:00.000+00:00", "generator": { "date": "2025-01-22T09:43:54.832+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2025-0148", "initial_release_date": "2025-01-21T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-21T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9", "product": { "name": "Oracle Communications 9.0", "product_id": "T018954", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0" } } }, { "category": "product_version", "name": "5.1", "product": { "name": "Oracle Communications 5.1", "product_id": "T028684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.1" } } }, { "category": "product_version", "name": "15.0.0.0.0", "product": { "name": "Oracle Communications 15.0.0.0.0", "product_id": "T032090", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.0.0.0" } } }, { "category": "product_version", "name": "23.4.0", "product": { "name": "Oracle Communications 23.4.0", "product_id": "T032091", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.0" } } }, { "category": "product_version", "name": "24.1.0", "product": { "name": "Oracle Communications 24.1.0", "product_id": "T034145", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0" } } }, { "category": "product_version", "name": "5.2", "product": { "name": "Oracle Communications 5.2", "product_id": "T034146", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.2" } } }, { "category": "product_version", "name": "23.4.4", "product": { "name": "Oracle Communications 23.4.4", "product_id": "T036196", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.4" } } }, { "category": "product_version", "name": "24.2.0", "product": { "name": "Oracle Communications 24.2.0", "product_id": "T036197", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.0" } } }, { "category": "product_version", "name": "4.1.0", "product": { "name": "Oracle Communications 4.1.0", "product_id": "T036205", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.1.0" } } }, { "category": "product_version", "name": "4.2.0", "product": { "name": "Oracle Communications 4.2.0", "product_id": "T036206", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.2.0" } } }, { "category": "product_version", "name": "9.2.0", "product": { "name": "Oracle Communications 9.2.0", "product_id": "T036207", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.2.0" } } }, { "category": "product_version", "name": "9.3.0", "product": { "name": "Oracle Communications 9.3.0", "product_id": "T036208", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.3.0" } } }, { "category": "product_version", "name": "24.2.1", "product": { "name": "Oracle Communications 24.2.1", "product_id": "T038376", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.1" } } }, { "category": "product_version", "name": "24.1.1", "product": { "name": "Oracle Communications 24.1.1", "product_id": "T038378", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.1" } } }, { "category": "product_version_range", "name": "\u003c=24.2.2", "product": { "name": "Oracle Communications \u003c=24.2.2", "product_id": "T038379" } }, { "category": "product_version_range", "name": "\u003c=24.2.2", "product": { "name": "Oracle Communications \u003c=24.2.2", "product_id": "T038379-fixed" } }, { "category": "product_version", "name": "14", "product": { "name": "Oracle Communications 14.0", "product_id": "T038382", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:14.0" } } }, { "category": "product_version", "name": "8.2.3.0.0", "product": { "name": "Oracle Communications 8.2.3.0.0", "product_id": "T040441", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.2.3.0.0" } } }, { "category": "product_version_range", "name": "\u003c=9.0.2.0.0", "product": { "name": "Oracle Communications \u003c=9.0.2.0.0", "product_id": "T040442" } }, { "category": "product_version_range", "name": "\u003c=9.0.2.0.0", "product": { "name": "Oracle Communications \u003c=9.0.2.0.0", "product_id": "T040442-fixed" } }, { "category": "product_version", "name": "12.11", "product": { "name": "Oracle Communications 12.11", "product_id": "T040443", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11" } } }, { "category": "product_version_range", "name": "\u003c=9.1.1.8", "product": { "name": "Oracle Communications \u003c=9.1.1.8", "product_id": "T040444" } }, { "category": "product_version_range", "name": "\u003c=9.1.1.8", "product": { "name": "Oracle Communications \u003c=9.1.1.8", "product_id": "T040444-fixed" } }, { "category": "product_version", "name": "8", "product": { "name": "Oracle Communications 8.0", "product_id": "T040445", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.0" } } }, { "category": "product_version", "name": "8.1", "product": { "name": "Oracle Communications 8.1", "product_id": "T040446", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.1" } } }, { "category": "product_version_range", "name": "\u003c=9.1.1.9", "product": { "name": "Oracle Communications \u003c=9.1.1.9", "product_id": "T040447" } }, { "category": "product_version_range", "name": "\u003c=9.1.1.9", "product": { "name": "Oracle Communications \u003c=9.1.1.9", "product_id": "T040447-fixed" } }, { "category": "product_version", "name": "24.3.0", "product": { "name": "Oracle Communications 24.3.0", "product_id": "T040448", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.3.0" } } }, { "category": "product_version", "name": "24.2.3", "product": { "name": "Oracle Communications 24.2.3", "product_id": "T040449", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.3" } } }, { "category": "product_version", "name": "8.6.0.4.0", "product": { "name": "Oracle Communications 8.6.0.4.0", "product_id": "T040450", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:8.6.0.4.0" } } }, { "category": "product_version", "name": "47.0.0.0.0", "product": { "name": "Oracle Communications 47.0.0.0.0", "product_id": "T040451", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:47.0.0.0.0" } } }, { "category": "product_version", "name": "9.0.0.0.0", "product": { "name": "Oracle Communications 9.0.0.0.0", "product_id": "T040452", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.0.0.0" } } }, { "category": "product_version", "name": "15", "product": { "name": "Oracle Communications 15.0", "product_id": "T040453", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40577", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-40577" }, { "cve": "CVE-2023-46218", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46604", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-46604" }, { "cve": "CVE-2023-50868", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-50868" }, { "cve": "CVE-2023-5678", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-5678" }, { "cve": "CVE-2024-0450", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-25638", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-25638" }, { "cve": "CVE-2024-28219", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-28219" }, { "cve": "CVE-2024-28834", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-28834" }, { "cve": "CVE-2024-33602", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34064", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35195", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-35195" }, { "cve": "CVE-2024-3596", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-3596" }, { "cve": "CVE-2024-37371", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38475", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38807", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-38807" }, { "cve": "CVE-2024-38819", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38827", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-38827" }, { "cve": "CVE-2024-41817", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-41817" }, { "cve": "CVE-2024-45492", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-45492" }, { "cve": "CVE-2024-47804", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-47804" }, { "cve": "CVE-2024-49766", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-49766" }, { "cve": "CVE-2024-49767", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-49767" }, { "cve": "CVE-2024-50602", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-50602" }, { "cve": "CVE-2024-53677", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-53677" }, { "cve": "CVE-2024-5535", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-5535" }, { "cve": "CVE-2024-56337", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-56337" }, { "cve": "CVE-2024-6119", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-6119" }, { "cve": "CVE-2024-7254", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7885", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-7885" }, { "cve": "CVE-2024-8006", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-8006" }, { "cve": "CVE-2024-9143", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036205", "T036206", "T036207", "T040449", "T036208", "T040448", "T034146", "T034145", "T038382", "T040450", "T040453", "T028684", "T040452", "T040451", "T036197", "T038376", "T038378", "T036196", "T018954", "T032090", "T032091", "T040446", "T040445", "T040443", "T040441" ], "last_affected": [ "T038379", "T040447", "T040444", "T040442" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-9143" } ] }
wid-sec-w-2025-0818
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0818 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0818.json" }, { "category": "self", "summary": "WID-SEC-2025-0818 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0818" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2025 - Appendix Oracle Fusion Middleware vom 2025-04-15", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixFMW" } ], "source_lang": "en-US", "title": "Oracle Fusion Middleware: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-04-15T22:00:00.000+00:00", "generator": { "date": "2025-04-16T09:16:22.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0818", "initial_release_date": "2025-04-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "12.2.1.4.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.4.0", "product_id": "751674", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.4.0" } } }, { "category": "product_version", "name": "14.1.1.0.0", "product": { "name": "Oracle Fusion Middleware 14.1.1.0.0", "product_id": "829576", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:14.1.1.0.0" } } }, { "category": "product_version", "name": "8.5.7", "product": { "name": "Oracle Fusion Middleware 8.5.7", "product_id": "T034057", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.7" } } }, { "category": "product_version", "name": "14.1.2.0.0", "product": { "name": "Oracle Fusion Middleware 14.1.2.0.0", "product_id": "T040467", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:14.1.2.0.0" } } } ], "category": "product_name", "name": "Fusion Middleware" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13936", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2020-13936" }, { "cve": "CVE-2020-25649", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2020-25649" }, { "cve": "CVE-2023-26464", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-26464" }, { "cve": "CVE-2024-11053", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-11053" }, { "cve": "CVE-2024-11612", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-11612" }, { "cve": "CVE-2024-25710", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-25710" }, { "cve": "CVE-2024-28168", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-28168" }, { "cve": "CVE-2024-29857", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-29857" }, { "cve": "CVE-2024-38476", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-38476" }, { "cve": "CVE-2024-40896", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-40896" }, { "cve": "CVE-2024-47072", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47561" }, { "cve": "CVE-2024-50602", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52046", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-52046" }, { "cve": "CVE-2024-56337", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-56337" }, { "cve": "CVE-2024-7254", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-7254" }, { "cve": "CVE-2024-9143", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-9143" }, { "cve": "CVE-2025-23184", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24970", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-24970" }, { "cve": "CVE-2025-27363", "product_status": { "known_affected": [ "T040467", "751674", "T034057", "829576" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-27363" } ] }
wid-sec-w-2024-3744
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- NetApp Appliance\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3744 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3744.json" }, { "category": "self", "summary": "WID-SEC-2024-3744 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3744" }, { "category": "external", "summary": "OSS Security Mailing List vom 2024-12-22", "url": "https://seclists.org/oss-sec/2024/q4/164" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-12-22", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-12-22", "url": "https://github.com/advisories/GHSA-27hp-xhwr-wr2m" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250103-0002 vom 2025-01-03", "url": "https://security.netapp.com/advisory/ntap-20250103-0002/" }, { "category": "external", "summary": "IBM Security Bulletin 7180700 vom 2025-01-10", "url": "https://www.ibm.com/support/pages/node/7180700" }, { "category": "external", "summary": "Debian Security Advisory DLA-4017 vom 2025-01-17", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5845 vom 2025-01-17", "url": "https://lists.debian.org/debian-security-announce/2025/msg00007.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT9-2025-015 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2025-015.html" }, { "category": "external", "summary": "Atlassian Security Bulletin", "url": "https://confluence.atlassian.com/security/security-bulletin-february-18-2025-1510670627.html" }, { "category": "external", "summary": "IBM Security Bulletin 7183584 vom 2025-02-18", "url": "https://www.ibm.com/support/pages/node/7183584" }, { "category": "external", "summary": "ATOSS Security News vom 2025-02-21", "url": "https://www.atoss.ch/de-ch/sicherheit/security-news" }, { "category": "external", "summary": "Camunda Security Notice vom 2025-03-10", "url": "https://docs.camunda.org/security/notices/#notice-130" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14896-1 vom 2025-03-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14897-1 vom 2025-03-16", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1024-1 vom 2025-03-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020602.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1126-1 vom 2025-04-03", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BWB3ONW7PC4GFVVAWTBQCRXXSFFEFAZL/" }, { "category": "external", "summary": "NetX Release Notes abgerufen am 2025-05-09", "url": "https://support.netx.net/hc/en-us/articles/4410091740695-NetX-Release-Notes" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4521 vom 2025-05-08", "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4522 vom 2025-05-08", "url": "https://access.redhat.com/errata/RHSA-2025:4522" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2TOMCAT9-2025-015 vom 2025-07-01", "url": "https://alas.aws.amazon.com/AL2/ALAS2TOMCAT9-2025-015.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11335 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11335 vom 2025-07-17", "url": "https://linux.oracle.com/errata/ELSA-2025-11335.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11334 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11333 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11333 vom 2025-07-17", "url": "https://linux.oracle.com/errata/ELSA-2025-11333.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11332 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11381 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:11382 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-11332 vom 2025-07-17", "url": "https://linux.oracle.com/errata/ELSA-2025-11332.html" } ], "source_lang": "en-US", "title": "Apache Tomcat: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2025-07-17T22:00:00.000+00:00", "generator": { "date": "2025-07-18T08:27:51.080+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3744", "initial_release_date": "2024-12-22T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-22T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-12-23T23:00:00.000+00:00", "number": "2", "summary": "Anpassung der Produkt-Versionen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-16T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-02-23T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates aufgenommen" }, { "date": "2025-03-16T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-05-08T22:00:00.000+00:00", "number": "14", "summary": "Update von NetX aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "17" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "ATOSS Staff Efficiency Suite", "product": { "name": "ATOSS Staff Efficiency Suite", "product_id": "T041371", "product_identification_helper": { "cpe": "cpe:/a:atoss:staff_efficiency_suite:-" } } } ], "category": "vendor", "name": "ATOSS" }, { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.0.2", "product": { "name": "Apache Tomcat \u003c11.0.2", "product_id": "T039886" } }, { "category": "product_version", "name": "11.0.2", "product": { "name": "Apache Tomcat 11.0.2", "product_id": "T039886-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:11.0.2" } } }, { "category": "product_version_range", "name": "\u003c10.1.34", "product": { "name": "Apache Tomcat \u003c10.1.34", "product_id": "T039887" } }, { "category": "product_version", "name": "10.1.34", "product": { "name": "Apache Tomcat 10.1.34", "product_id": "T039887-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:10.1.34" } } }, { "category": "product_version_range", "name": "\u003c9.0.98", "product": { "name": "Apache Tomcat \u003c9.0.98", "product_id": "T039888" } }, { "category": "product_version", "name": "9.0.98", "product": { "name": "Apache Tomcat 9.0.98", "product_id": "T039888-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:9.0.98" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Data Center and Server \u003c9.2.1", "product": { "name": "Atlassian Confluence Data Center and Server \u003c9.2.1", "product_id": "T041273" } }, { "category": "product_version", "name": "Data Center and Server 9.2.1", "product": { "name": "Atlassian Confluence Data Center and Server 9.2.1", "product_id": "T041273-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:data_center_and_server__9.2.1" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c8.5.19", "product": { "name": "Atlassian Confluence Data Center and Server \u003c8.5.19", "product_id": "T041274" } }, { "category": "product_version", "name": "Data Center and Server 8.5.19", "product": { "name": "Atlassian Confluence Data Center and Server 8.5.19", "product_id": "T041274-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:data_center_and_server__8.5.19" } } } ], "category": "product_name", "name": "Confluence" } ], "category": "vendor", "name": "Atlassian" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "IBM Integration Bus", "product": { "name": "IBM Integration Bus", "product_id": "T039654", "product_identification_helper": { "cpe": "cpe:/a:ibm:integration_bus:for_zos" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF01", "product_id": "T041270" } }, { "category": "product_version", "name": "7.5.0 UP11 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF01", "product_id": "T041270-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if01" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for Linux", "product": { "name": "NetApp ActiveIQ Unified Manager for Linux", "product_id": "T023548", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_linux" } } }, { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } }, { "category": "product_version", "name": "for Microsoft Windows", "product": { "name": "NetApp ActiveIQ Unified Manager for Microsoft Windows", "product_id": "T025631", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.12.4", "product": { "name": "NetX NetX \u003c11.12.4", "product_id": "T043517" } }, { "category": "product_version", "name": "11.12.4", "product": { "name": "NetX NetX 11.12.4", "product_id": "T043517-fixed", "product_identification_helper": { "cpe": "cpe:/a:netx:netx:11.12.4" } } } ], "category": "product_name", "name": "NetX" } ], "category": "vendor", "name": "NetX" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.20.11", "product": { "name": "Open Source Camunda \u003c7.20.11", "product_id": "T041688" } }, { "category": "product_version", "name": "7.20.11", "product": { "name": "Open Source Camunda 7.20.11", "product_id": "T041688-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.20.11" } } }, { "category": "product_version_range", "name": "\u003c7.21.8", "product": { "name": "Open Source Camunda \u003c7.21.8", "product_id": "T041689" } }, { "category": "product_version", "name": "7.21.8", "product": { "name": "Open Source Camunda 7.21.8", "product_id": "T041689-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.21.8" } } }, { "category": "product_version_range", "name": "\u003c7.22.3", "product": { "name": "Open Source Camunda \u003c7.22.3", "product_id": "T041690" } }, { "category": "product_version", "name": "7.22.3", "product": { "name": "Open Source Camunda 7.22.3", "product_id": "T041690-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.22.3" } } }, { "category": "product_version_range", "name": "\u003c7.23.0-alpha4", "product": { "name": "Open Source Camunda \u003c7.23.0-alpha4", "product_id": "T041691" } }, { "category": "product_version", "name": "7.23.0-alpha4", "product": { "name": "Open Source Camunda 7.23.0-alpha4", "product_id": "T041691-fixed", "product_identification_helper": { "cpe": "cpe:/a:camunda:camunda:7.23.0-alpha4" } } } ], "category": "product_name", "name": "Camunda" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c5.8.4", "product": { "name": "Red Hat JBoss Web Server \u003c5.8.4", "product_id": "T043515" } }, { "category": "product_version", "name": "5.8.4", "product": { "name": "Red Hat JBoss Web Server 5.8.4", "product_id": "T043515-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.8.4" } } } ], "category": "product_name", "name": "JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-56337", "product_status": { "known_affected": [ "T025152", "67646", "T039887", "T043517", "T039886", "T039888", "T004914", "T039654", "T023548", "T041274", "T041273", "T041691", "T041371", "T041690", "2951", "T002207", "T041270", "T043515", "T025631", "T027843", "T041689", "398363", "T041688" ] }, "release_date": "2024-12-22T23:00:00.000+00:00", "title": "CVE-2024-56337" } ] }
wid-sec-w-2025-0823
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0823 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0823.json" }, { "category": "self", "summary": "WID-SEC-2025-0823 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0823" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2025 - Appendix Oracle Communications vom 2025-04-15", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixCGBU" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20254-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021063.html" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-03T22:00:00.000+00:00", "generator": { "date": "2025-06-04T09:28:41.594+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0823", "initial_release_date": "2025-04-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "46.6", "product": { "name": "Oracle Communications 46.6", "product_id": "T022826", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:46.6" } } }, { "category": "product_version", "name": "22.4.0", "product": { "name": "Oracle Communications 22.4.0", "product_id": "T024981", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:22.4.0" } } }, { "category": "product_version", "name": "9.0.0", "product": { "name": "Oracle Communications 9.0.0", "product_id": "T027330", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.0" } } }, { "category": "product_version", "name": "9.0.1", "product": { "name": "Oracle Communications 9.0.1", "product_id": "T027331", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.1" } } }, { "category": "product_version", "name": "9.0.0.0", "product": { "name": "Oracle Communications 9.0.0.0", "product_id": "T030589", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.0.0" } } }, { "category": "product_version", "name": "9.0.2", "product": { "name": "Oracle Communications 9.0.2", "product_id": "T030595", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.0.2" } } }, { "category": "product_version", "name": "15.0.0.0.0", "product": { "name": "Oracle Communications 15.0.0.0.0", "product_id": "T032090", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.0.0.0" } } }, { "category": "product_version_range", "name": "\u003c=23.4.0", "product": { "name": "Oracle Communications \u003c=23.4.0", "product_id": "T032091" } }, { "category": "product_version_range", "name": "\u003c=23.4.0", "product": { "name": "Oracle Communications \u003c=23.4.0", "product_id": "T032091-fixed" } }, { "category": "product_version", "name": "24.1.0", "product": { "name": "Oracle Communications 24.1.0", "product_id": "T034145", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0" } } }, { "category": "product_version", "name": "5.2", "product": { "name": "Oracle Communications 5.2", "product_id": "T034146", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.2" } } }, { "category": "product_version", "name": "24.2.0", "product": { "name": "Oracle Communications 24.2.0", "product_id": "T036197", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.0" } } }, { "category": "product_version", "name": "4.1.0", "product": { "name": "Oracle Communications 4.1.0", "product_id": "T036205", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.1.0" } } }, { "category": "product_version", "name": "4.2.0", "product": { "name": "Oracle Communications 4.2.0", "product_id": "T036206", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.2.0" } } }, { "category": "product_version", "name": "9.2.0", "product": { "name": "Oracle Communications 9.2.0", "product_id": "T036207", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.2.0" } } }, { "category": "product_version", "name": "9.3.0", "product": { "name": "Oracle Communications 9.3.0", "product_id": "T036208", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.3.0" } } }, { "category": "product_version_range", "name": "\u003c=9.0.3", "product": { "name": "Oracle Communications \u003c=9.0.3", "product_id": "T036210" } }, { "category": "product_version_range", "name": "\u003c=9.0.3", "product": { "name": "Oracle Communications \u003c=9.0.3", "product_id": "T036210-fixed" } }, { "category": "product_version_range", "name": "\u003c=24.2.2", "product": { "name": "Oracle Communications \u003c=24.2.2", "product_id": "T038379" } }, { "category": "product_version_range", "name": "\u003c=24.2.2", "product": { "name": "Oracle Communications \u003c=24.2.2", "product_id": "T038379-fixed" } }, { "category": "product_version", "name": "9.1.1.9", "product": { "name": "Oracle Communications 9.1.1.9", "product_id": "T040447", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.1.1.9" } } }, { "category": "product_version_range", "name": "\u003c=24.3.0", "product": { "name": "Oracle Communications \u003c=24.3.0", "product_id": "T040448" } }, { "category": "product_version_range", "name": "\u003c=24.3.0", "product": { "name": "Oracle Communications \u003c=24.3.0", "product_id": "T040448-fixed" } }, { "category": "product_version", "name": "24.2.3", "product": { "name": "Oracle Communications 24.2.3", "product_id": "T040449", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.3" } } }, { "category": "product_version", "name": "24.2.5", "product": { "name": "Oracle Communications 24.2.5", "product_id": "T042793", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.5" } } }, { "category": "product_version", "name": "25.1.100", "product": { "name": "Oracle Communications 25.1.100", "product_id": "T042794", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:25.1.100" } } }, { "category": "product_version", "name": "10.0.0", "product": { "name": "Oracle Communications 10.0.0", "product_id": "T042795", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.0.0" } } }, { "category": "product_version_range", "name": "\u003c=24.2.4", "product": { "name": "Oracle Communications \u003c=24.2.4", "product_id": "T042796" } }, { "category": "product_version_range", "name": "\u003c=24.2.4", "product": { "name": "Oracle Communications \u003c=24.2.4", "product_id": "T042796-fixed" } }, { "category": "product_version", "name": "15.0.0", "product": { "name": "Oracle Communications 15.0.0", "product_id": "T042797", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.0" } } }, { "category": "product_version", "name": "15.0.1", "product": { "name": "Oracle Communications 15.0.1", "product_id": "T042798", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.1" } } }, { "category": "product_version", "name": "15.0.2", "product": { "name": "Oracle Communications 15.0.2", "product_id": "T042799", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.2" } } }, { "category": "product_version", "name": "14.0.0", "product": { "name": "Oracle Communications 14.0.0", "product_id": "T042800", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:14.0.0" } } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49582", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-49582" }, { "cve": "CVE-2023-51074", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-51074" }, { "cve": "CVE-2023-5388", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-5388" }, { "cve": "CVE-2023-5685", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2023-5685" }, { "cve": "CVE-2024-1135", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-1135" }, { "cve": "CVE-2024-12797", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-12797" }, { "cve": "CVE-2024-21538", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-21538" }, { "cve": "CVE-2024-25638", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-25638" }, { "cve": "CVE-2024-28168", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-28168" }, { "cve": "CVE-2024-28219", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-28219" }, { "cve": "CVE-2024-28834", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-28834" }, { "cve": "CVE-2024-34064", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-35195", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-35195" }, { "cve": "CVE-2024-37891", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38819", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38827", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-38827" }, { "cve": "CVE-2024-40896", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-40896" }, { "cve": "CVE-2024-4227", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-4227" }, { "cve": "CVE-2024-43044", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-43044" }, { "cve": "CVE-2024-47072", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-47554" }, { "cve": "CVE-2024-49767", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-49767" }, { "cve": "CVE-2024-50602", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52046", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-52046" }, { "cve": "CVE-2024-52303", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-52303" }, { "cve": "CVE-2024-5535", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-5535" }, { "cve": "CVE-2024-56128", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-56128" }, { "cve": "CVE-2024-56337", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-56337" }, { "cve": "CVE-2024-57699", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-57699" }, { "cve": "CVE-2024-6763", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-6763" }, { "cve": "CVE-2024-7254", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-7254" }, { "cve": "CVE-2025-1974", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-1974" }, { "cve": "CVE-2025-23184", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24813", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-24813" }, { "cve": "CVE-2025-24928", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-24928" }, { "cve": "CVE-2025-24970", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-24970" }, { "cve": "CVE-2025-27516", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-27516" }, { "cve": "CVE-2025-27789", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-27789" }, { "cve": "CVE-2025-31721", "product_status": { "known_affected": [ "T027330", "T030595", "T030589", "T036205", "T036206", "T036207", "T040449", "T036208", "T022826", "T036197", "T034146", "T034145", "T042794", "T042795", "T042797", "T002207", "T042798", "T042799", "T032090", "T042800", "T040447", "T024981", "T027331", "T042793" ], "last_affected": [ "T042796", "T032091", "T040448", "T038379", "T036210" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-31721" } ] }
fkie_cve-2024-56337
Vulnerability from fkie_nvd
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp | Mailing List, Vendor Advisory | |
security@apache.org | https://www.cve.org/CVERecord?id=CVE-2024-50379 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250103-0002/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
apache | tomcat | * | |
apache | tomcat | * | |
apache | tomcat | * | |
netapp | bootstrap_os | - | |
netapp | hci_compute_node | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A10E3B7-32E3-40A9-9633-CAA2F1E2EFA3", "versionEndExcluding": "9.0.98", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "499AC261-223E-483B-81AF-AFD6BEA35502", "versionEndExcluding": "10.1.34", "versionStartIncluding": "10.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC54C74D-E851-4A9A-9C49-B8C80D5502AE", "versionEndExcluding": "11.0.2", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the\u00a0system property sun.io.useCanonCaches, if set, must be set to false\u00a0(it defaults to false)\n- running on Java 21 onwards: no further configuration is required\u00a0(the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u00a0sun.io.useCanonCaches to false by default where it can." }, { "lang": "es", "value": "Vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de uso y tiempo de verificaci\u00f3n (TOCTOU) en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.1, desde 10.1.0-M1 hasta 10.1.33, desde 9.0.0.M1 hasta 9.0.97. La mitigaci\u00f3n de CVE-2024-50379 fue incompleta. Los usuarios que ejecuten Tomcat en un sistema de archivos que no distinga entre may\u00fasculas y min\u00fasculas con la escritura del servlet predeterminada habilitada (el par\u00e1metro de inicializaci\u00f3n de solo lectura establecido en el valor no predeterminado de falso) pueden necesitar una configuraci\u00f3n adicional para mitigar por completo CVE-2024-50379 seg\u00fan la versi\u00f3n de Java que est\u00e9n usando con Tomcat: - ejecut\u00e1ndose en Java 8 o Java 11: la propiedad del sistema sun.io.useCanonCaches debe establecerse expl\u00edcitamente en falso (el valor predeterminado es verdadero) - ejecut\u00e1ndose en Java 17: la propiedad del sistema sun.io.useCanonCaches, si est\u00e1 establecida, debe establecerse en falso (el valor predeterminado es falso) - ejecut\u00e1ndose en Java 21 en adelante: no se requiere ninguna configuraci\u00f3n adicional (la propiedad del sistema y el cach\u00e9 problem\u00e1tico se han eliminado) Tomcat 11.0.3, 10.1.35 y 9.0.99 en adelante incluir\u00e1n comprobaciones de que sun.io.useCanonCaches est\u00e9 configurado correctamente antes de permitir que el servlet predeterminado est\u00e9 habilitado para escritura en un sistema de archivos que no distinga entre may\u00fasculas y min\u00fasculas. Tomcat tambi\u00e9n establecer\u00e1 sun.io.useCanonCaches como falso de forma predeterminada cuando sea posible." } ], "id": "CVE-2024-56337", "lastModified": "2025-08-08T12:15:27.340", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-12-20T16:15:24.260", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250103-0002/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "security@apache.org", "type": "Secondary" } ] }
ghsa-27hp-xhwr-wr2m
Vulnerability from github
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The mitigation for CVE-2024-50379 was incomplete.
Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)
Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M1" }, { "fixed": "11.0.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "10.1.0-M1" }, { "fixed": "10.1.34" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "9.0.0.M1" }, { "fixed": "9.0.98" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M1" }, { "fixed": "11.0.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "10.1.0-M1" }, { "fixed": "10.1.34" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "9.0.0.M1" }, { "fixed": "9.0.98" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-56337" ], "database_specific": { "cwe_ids": [ "CWE-367" ], "github_reviewed": true, "github_reviewed_at": "2024-12-20T19:50:45Z", "nvd_published_at": "2024-12-20T16:15:24Z", "severity": "HIGH" }, "details": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the\u00a0system property sun.io.useCanonCaches, if set, must be set to false\u00a0(it defaults to false)\n- running on Java 21 onwards: no further configuration is required\u00a0(the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u00a0sun.io.useCanonCaches to false by default where it can.", "id": "GHSA-27hp-xhwr-wr2m", "modified": "2025-01-08T16:05:12Z", "published": "2024-12-20T18:31:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20250103-0002" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98" }, { "type": "WEB", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "type": "CVSS_V4" } ], "summary": "Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.