ncsc-2025-0159
Vulnerability from csaf_ncscnl
Published
2025-05-13 19:47
Modified
2025-05-13 19:47
Summary
Kwetsbaarheden verholpen in Microsoft Windows

Notes

The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service (DoS) - Omzeilen van een beveiligingsmaatregel - Uitvoer van willekeurige code (root/adminrechten) - Uitvoer van willekeurige code (gebruikersrechten) - Toegang tot systeemgegevens - Toegang tot gevoelige gegevens - Verkrijgen van verhoogde rechten ``` Windows Trusted Runtime Interface Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29829 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows File Server: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29839 | 4.00 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Remote Desktop: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29966 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Active Directory Certificate Services (AD CS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29968 | 6.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Ancillary Function Driver for WinSock: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-32709 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Drivers: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29838 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Kernel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29974 | 5.70 | Toegang tot gevoelige gegevens | | CVE-2025-24063 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows DWM: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-30400 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Brokering File System: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29970 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Installer: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29837 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Scripting Engine: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-30397 | 7.50 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Hardware Lab Kit: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-27488 | 6.70 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Routing and Remote Access Service (RRAS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29959 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-29960 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-29830 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-29832 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-29835 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-29836 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-29958 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-29961 | 6.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Win32K - GRFX: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-30388 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Role: Windows Hyper-V: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29955 | 6.20 | Denial-of-Service | |----------------|------|-------------------------------------| Web Threat Defense (WTD.sys): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29971 | 7.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows NTFS: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-32707 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Remote Desktop Gateway Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29967 | 8.80 | Uitvoeren van willekeurige code | | CVE-2025-30394 | 5.90 | Denial-of-Service | | CVE-2025-26677 | 7.50 | Denial-of-Service | | CVE-2025-29831 | 7.50 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Universal Print Management Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29841 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Media: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29964 | 8.80 | Uitvoeren van willekeurige code | | CVE-2025-29840 | 8.80 | Uitvoeren van willekeurige code | | CVE-2025-29962 | 8.80 | Uitvoeren van willekeurige code | | CVE-2025-29963 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Virtual Machine Bus: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29833 | 7.10 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows SMB: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29956 | 5.40 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Common Log File System Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-32701 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-32706 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-30385 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Secure Kernel Mode: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-27468 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Fundamentals: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29969 | 7.50 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows LDAP - Lightweight Directory Access Protocol: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29954 | 5.90 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Deployment Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29957 | 6.20 | Denial-of-Service | |----------------|------|-------------------------------------| UrlMon: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-29842 | 7.50 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| ```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op: https://portal.msrc.microsoft.com/en-us/security-guidance
Kans
medium
Schade
high
CWE-591
Sensitive Data Storage in Improperly Locked Memory
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-191
Integer Underflow (Wrap or Wraparound)
CWE-126
Buffer Over-read
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-908
Use of Uninitialized Resource
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-798
Use of Hard-coded Credentials
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-400
Uncontrolled Resource Consumption
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation



{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van een beveiligingsmaatregel\n- Uitvoer van willekeurige code (root/adminrechten)\n- Uitvoer van willekeurige code (gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verkrijgen van verhoogde rechten\n\n```\nWindows Trusted Runtime Interface Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29829 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows File Server: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29839 | 4.00 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29966 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nActive Directory Certificate Services (AD CS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29968 | 6.50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Ancillary Function Driver for WinSock: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-32709 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29838 | 7.40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29974 | 5.70 | Toegang tot gevoelige gegevens      | \n| CVE-2025-24063 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows DWM: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-30400 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Brokering File System: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29970 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29837 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nMicrosoft Scripting Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-30397 | 7.50 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Hardware Lab Kit: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27488 | 6.70 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29959 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-29960 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-29830 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-29832 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-29835 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-29836 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-29958 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-29961 | 6.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-30388 | 7.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29955 | 6.20 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWeb Threat Defense (WTD.sys): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29971 | 7.50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-32707 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Gateway Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29967 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2025-30394 | 5.90 | Denial-of-Service                   | \n| CVE-2025-26677 | 7.50 | Denial-of-Service                   | \n| CVE-2025-29831 | 7.50 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nUniversal Print Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29841 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Media: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29964 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2025-29840 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2025-29962 | 8.80 | Uitvoeren van willekeurige code     | \n| CVE-2025-29963 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Virtual Machine Bus: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29833 | 7.10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows SMB: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29956 | 5.40 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-32701 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-32706 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-30385 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Secure Kernel Mode: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27468 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Fundamentals: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29969 | 7.50 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows LDAP - Lightweight Directory Access Protocol: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29954 | 5.90 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Deployment Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29957 | 6.20 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nUrlMon: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29842 | 7.50 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n```",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Sensitive Data Storage in Improperly Locked Memory",
        "title": "CWE-591"
      },
      {
        "category": "general",
        "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
        "title": "CWE-59"
      },
      {
        "category": "general",
        "text": "Integer Underflow (Wrap or Wraparound)",
        "title": "CWE-191"
      },
      {
        "category": "general",
        "text": "Buffer Over-read",
        "title": "CWE-126"
      },
      {
        "category": "general",
        "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
        "title": "CWE-349"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Use of Uninitialized Resource",
        "title": "CWE-908"
      },
      {
        "category": "general",
        "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
        "title": "CWE-843"
      },
      {
        "category": "general",
        "text": "Use of Hard-coded Credentials",
        "title": "CWE-798"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "title": "Kwetsbaarheden verholpen in Microsoft Windows",
    "tracking": {
      "current_release_date": "2025-05-13T19:47:12.555983Z",
      "generator": {
        "date": "2025-02-25T15:15:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.0"
        }
      },
      "id": "NCSC-2025-0159",
      "initial_release_date": "2025-05-13T19:47:12.555983Z",
      "revision_history": [
        {
          "date": "2025-05-13T19:47:12.555983Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19045.5854",
                    "product": {
                      "name": "vers:microsoft/10.0.19045.5854",
                      "product_id": "CSAFPID-2835605",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5854:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 22H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22621.5335",
                    "product": {
                      "name": "vers:microsoft/10.0.22621.5335",
                      "product_id": "CSAFPID-2835604",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5335:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 22H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22621.5335",
                    "product": {
                      "name": "vers:microsoft/10.0.22621.5335",
                      "product_id": "CSAFPID-2835603",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5335:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 22H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19044.5854",
                    "product": {
                      "name": "vers:microsoft/10.0.19044.5854",
                      "product_id": "CSAFPID-2835602",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5854:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 21H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19044.5854",
                    "product": {
                      "name": "vers:microsoft/10.0.19044.5854",
                      "product_id": "CSAFPID-2835601",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5854:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 21H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19044.5854",
                    "product": {
                      "name": "vers:microsoft/10.0.19044.5854",
                      "product_id": "CSAFPID-2835600",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5854:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 21H2 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.20348.3692",
                    "product": {
                      "name": "vers:microsoft/10.0.20348.3692",
                      "product_id": "CSAFPID-2835599",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3692:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2022 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7314",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7314",
                      "product_id": "CSAFPID-2835596",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7314:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2019"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7314",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7314",
                      "product_id": "CSAFPID-2835597",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7314:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2019 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.8066",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.8066",
                      "product_id": "CSAFPID-2835620",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.8066:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2016 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.8066",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.8066",
                      "product_id": "CSAFPID-2835618",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.8066:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1607 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.8066",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.8066",
                      "product_id": "CSAFPID-2835617",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.8066:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1607 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.10240.21014",
                    "product": {
                      "name": "vers:microsoft/10.0.10240.21014",
                      "product_id": "CSAFPID-2835616",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21014:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.10240.21014",
                    "product": {
                      "name": "vers:microsoft/10.0.10240.21014",
                      "product_id": "CSAFPID-2835615",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21014:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-2835634",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_hlk_2025:*:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows HLK for Windows Server 2025"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.26100.4061",
                    "product": {
                      "name": "vers:microsoft/10.0.26100.4061",
                      "product_id": "CSAFPID-2835613",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.4061:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 24H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.26100.4061",
                    "product": {
                      "name": "vers:microsoft/10.0.26100.4061",
                      "product_id": "CSAFPID-2835612",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.4061:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 24H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22631.5335",
                    "product": {
                      "name": "vers:microsoft/10.0.22631.5335",
                      "product_id": "CSAFPID-2835610",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5335:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 23H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22631.5335",
                    "product": {
                      "name": "vers:microsoft/10.0.22631.5335",
                      "product_id": "CSAFPID-2835609",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5335:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 23H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19045.5854",
                    "product": {
                      "name": "vers:microsoft/10.0.19045.5854",
                      "product_id": "CSAFPID-2835607",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5854:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 22H2 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19045.5854",
                    "product": {
                      "name": "vers:microsoft/10.0.19045.5854",
                      "product_id": "CSAFPID-2835606",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5854:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 22H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7314",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7314",
                      "product_id": "CSAFPID-2835595",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7314:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1809 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7314",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7314",
                      "product_id": "CSAFPID-2835594",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7314:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1809 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-2835644",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_hlk_2019:*:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows HLK for Windows Server 2019"
              }
            ],
            "category": "product_family",
            "name": "Windows"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19044.5854 arm",
                    "product": {
                      "name": "vers:microsoft/10.0.19044.5854 arm",
                      "product_id": "CSAFPID-2835574"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 21h2"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.8066",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.8066",
                      "product_id": "CSAFPID-2835563"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2016"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.26100.4061",
                    "product": {
                      "name": "vers:microsoft/10.0.26100.4061",
                      "product_id": "CSAFPID-2835557"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2025"
              }
            ],
            "category": "product_family",
            "name": "Microsoft"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577",
                "product": {
                  "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577",
                  "product_id": "CSAFPID-2835224"
                }
              }
            ],
            "category": "product_name",
            "name": "Windows Server 2012 R2"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577",
                "product": {
                  "name": "vers:unknown/6.3.9600.0|\u003c6.3.9600.22577",
                  "product_id": "CSAFPID-2835225"
                }
              }
            ],
            "category": "product_name",
            "name": "Windows Server 2012 R2 (Server Core installation)"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.2.9200.25475",
                    "product": {
                      "name": "vers:microsoft/6.2.9200.25475",
                      "product_id": "CSAFPID-2835627",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25475:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2012"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.1.7601.27729",
                    "product": {
                      "name": "vers:microsoft/6.1.7601.27729",
                      "product_id": "CSAFPID-2835625",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27729:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.1.7601.27729",
                    "product": {
                      "name": "vers:microsoft/6.1.7601.27729",
                      "product_id": "CSAFPID-2835626",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27729:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.0.6003.23279",
                    "product": {
                      "name": "vers:microsoft/6.0.6003.23279",
                      "product_id": "CSAFPID-2835624",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23279:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.0.6003.23279",
                    "product": {
                      "name": "vers:microsoft/6.0.6003.23279",
                      "product_id": "CSAFPID-2835621",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23279:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 for 32-bit Systems Service Pack 2"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.0.6003.23279",
                    "product": {
                      "name": "vers:microsoft/6.0.6003.23279",
                      "product_id": "CSAFPID-2835622",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23279:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)"
              }
            ],
            "category": "product_family",
            "name": "ESU"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/10.0.25398.0|\u003c10.0.25398.1611",
                "product": {
                  "name": "vers:unknown/10.0.25398.0|\u003c10.0.25398.1611",
                  "product_id": "CSAFPID-2835218"
                }
              }
            ],
            "category": "product_name",
            "name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061",
                "product": {
                  "name": "vers:unknown/10.0.26100.0|\u003c10.0.26100.4061",
                  "product_id": "CSAFPID-2835217"
                }
              }
            ],
            "category": "product_name",
            "name": "Windows Server 2025 (Server Core installation)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/1.0.0|\u003c16.97.25042725",
                "product": {
                  "name": "vers:unknown/1.0.0|\u003c16.97.25042725",
                  "product_id": "CSAFPID-2835429"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Office LTSC for Mac 2024"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/16.0.1|\u003c16.0.14326.22502",
                "product": {
                  "name": "vers:unknown/16.0.1|\u003c16.0.14326.22502",
                  "product_id": "CSAFPID-2835439"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Office for Universal"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/16.0.1|\u003c16.0.18827.20000",
                "product": {
                  "name": "vers:unknown/16.0.1|\u003c16.0.18827.20000",
                  "product_id": "CSAFPID-2835428"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Office for Android"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/16.0.1|\u003c16.97.25042725",
                "product": {
                  "name": "vers:unknown/16.0.1|\u003c16.97.25042725",
                  "product_id": "CSAFPID-2835427"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Office LTSC for Mac 2021"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-1260618"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Windows Server 2022"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-1322604"
                }
              }
            ],
            "category": "product_name",
            "name": "Microsoft Windows Server 2012 R2 (Server Core installation)"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-29959",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Uninitialized Resource",
          "title": "CWE-908"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29959",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29959.json"
        }
      ],
      "title": "CVE-2025-29959"
    },
    {
      "cve": "CVE-2025-29960",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29960",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29960.json"
        }
      ],
      "title": "CVE-2025-29960"
    },
    {
      "cve": "CVE-2025-29964",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29964",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29964.json"
        }
      ],
      "title": "CVE-2025-29964"
    },
    {
      "cve": "CVE-2025-29966",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29966",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29966.json"
        }
      ],
      "title": "CVE-2025-29966"
    },
    {
      "cve": "CVE-2025-29967",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29967",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29967.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29967"
    },
    {
      "cve": "CVE-2025-29969",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29969",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29969.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29969"
    },
    {
      "cve": "CVE-2025-27468",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27468",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27468.json"
        }
      ],
      "title": "CVE-2025-27468"
    },
    {
      "cve": "CVE-2025-30400",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30400",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30400.json"
        }
      ],
      "title": "CVE-2025-30400"
    },
    {
      "cve": "CVE-2025-32701",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-32701",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-32701.json"
        }
      ],
      "title": "CVE-2025-32701"
    },
    {
      "cve": "CVE-2025-32706",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-32706",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-32706.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-32706"
    },
    {
      "cve": "CVE-2025-32709",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-32709",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-32709.json"
        }
      ],
      "title": "CVE-2025-32709"
    },
    {
      "cve": "CVE-2025-29829",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Uninitialized Resource",
          "title": "CWE-908"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29829",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29829.json"
        }
      ],
      "title": "CVE-2025-29829"
    },
    {
      "cve": "CVE-2025-29830",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Uninitialized Resource",
          "title": "CWE-908"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29830",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29830.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29830"
    },
    {
      "cve": "CVE-2025-29832",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29832",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29832.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29832"
    },
    {
      "cve": "CVE-2025-29833",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29833",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29833.json"
        }
      ],
      "title": "CVE-2025-29833"
    },
    {
      "cve": "CVE-2025-29835",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29835",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29835.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29835"
    },
    {
      "cve": "CVE-2025-29836",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29836",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29836.json"
        }
      ],
      "title": "CVE-2025-29836"
    },
    {
      "cve": "CVE-2025-29837",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
          "title": "CWE-59"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29837",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29837.json"
        }
      ],
      "title": "CVE-2025-29837"
    },
    {
      "cve": "CVE-2025-29839",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29839",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29839.json"
        }
      ],
      "title": "CVE-2025-29839"
    },
    {
      "cve": "CVE-2025-29840",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29840",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29840.json"
        }
      ],
      "title": "CVE-2025-29840"
    },
    {
      "cve": "CVE-2025-29842",
      "cwe": {
        "id": "CWE-349",
        "name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
          "title": "CWE-349"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29842",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29842.json"
        }
      ],
      "title": "CVE-2025-29842"
    },
    {
      "cve": "CVE-2025-29954",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29954",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29954.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29954"
    },
    {
      "cve": "CVE-2025-29956",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Over-read",
          "title": "CWE-126"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29956",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29956.json"
        }
      ],
      "title": "CVE-2025-29956"
    },
    {
      "cve": "CVE-2025-29957",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29957",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29957.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29957"
    },
    {
      "cve": "CVE-2025-29958",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Uninitialized Resource",
          "title": "CWE-908"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29958",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29958.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29958"
    },
    {
      "cve": "CVE-2025-29961",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29961",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29961.json"
        }
      ],
      "title": "CVE-2025-29961"
    },
    {
      "cve": "CVE-2025-29962",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29962",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29962.json"
        }
      ],
      "title": "CVE-2025-29962"
    },
    {
      "cve": "CVE-2025-29963",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29963",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29963.json"
        }
      ],
      "title": "CVE-2025-29963"
    },
    {
      "cve": "CVE-2025-29974",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "Integer Underflow (Wrap or Wraparound)",
          "title": "CWE-191"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29974",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29974.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29974"
    },
    {
      "cve": "CVE-2025-30385",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30385",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30385.json"
        }
      ],
      "title": "CVE-2025-30385"
    },
    {
      "cve": "CVE-2025-30388",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30388",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30388.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-30388"
    },
    {
      "cve": "CVE-2025-30397",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
          "title": "CWE-843"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30397",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30397.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-30397"
    },
    {
      "cve": "CVE-2025-32707",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-32707",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-32707.json"
        }
      ],
      "title": "CVE-2025-32707"
    },
    {
      "cve": "CVE-2025-24063",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24063",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24063.json"
        }
      ],
      "title": "CVE-2025-24063"
    },
    {
      "cve": "CVE-2025-29968",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29968",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29968.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29968"
    },
    {
      "cve": "CVE-2025-30394",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30394",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30394.json"
        }
      ],
      "title": "CVE-2025-30394"
    },
    {
      "cve": "CVE-2025-26677",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26677",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26677.json"
        }
      ],
      "title": "CVE-2025-26677"
    },
    {
      "cve": "CVE-2025-29831",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29831",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29831.json"
        }
      ],
      "title": "CVE-2025-29831"
    },
    {
      "cve": "CVE-2025-29841",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29841",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29841.json"
        }
      ],
      "title": "CVE-2025-29841"
    },
    {
      "cve": "CVE-2025-29971",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29971",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29971.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29971"
    },
    {
      "cve": "CVE-2025-29970",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29970",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29970.json"
        }
      ],
      "title": "CVE-2025-29970"
    },
    {
      "cve": "CVE-2025-29838",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29838",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29838.json"
        }
      ],
      "title": "CVE-2025-29838"
    },
    {
      "cve": "CVE-2025-29955",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29955",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29955.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2835605",
            "CSAFPID-2835604",
            "CSAFPID-2835603",
            "CSAFPID-2835574",
            "CSAFPID-2835602",
            "CSAFPID-2835601",
            "CSAFPID-2835600",
            "CSAFPID-2835599",
            "CSAFPID-1260618",
            "CSAFPID-2835596",
            "CSAFPID-2835597",
            "CSAFPID-1322604",
            "CSAFPID-2835224",
            "CSAFPID-2835225",
            "CSAFPID-2835627",
            "CSAFPID-2835625",
            "CSAFPID-2835626",
            "CSAFPID-2835624",
            "CSAFPID-2835621",
            "CSAFPID-2835622",
            "CSAFPID-2835620",
            "CSAFPID-2835563",
            "CSAFPID-2835618",
            "CSAFPID-2835617",
            "CSAFPID-2835616",
            "CSAFPID-2835615",
            "CSAFPID-2835634",
            "CSAFPID-2835613",
            "CSAFPID-2835612",
            "CSAFPID-2835218",
            "CSAFPID-2835610",
            "CSAFPID-2835609",
            "CSAFPID-2835217",
            "CSAFPID-2835607",
            "CSAFPID-2835606",
            "CSAFPID-2835595",
            "CSAFPID-2835594",
            "CSAFPID-2835557",
            "CSAFPID-2835429",
            "CSAFPID-2835439",
            "CSAFPID-2835428",
            "CSAFPID-2835427",
            "CSAFPID-2835644"
          ]
        }
      ],
      "title": "CVE-2025-29955"
    },
    {
      "cve": "CVE-2025-27488",
      "cwe": {
        "id": "CWE-798",
        "name": "Use of Hard-coded Credentials"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Hard-coded Credentials",
          "title": "CWE-798"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2835605",
          "CSAFPID-2835604",
          "CSAFPID-2835603",
          "CSAFPID-2835574",
          "CSAFPID-2835602",
          "CSAFPID-2835601",
          "CSAFPID-2835600",
          "CSAFPID-2835599",
          "CSAFPID-1260618",
          "CSAFPID-2835596",
          "CSAFPID-2835597",
          "CSAFPID-1322604",
          "CSAFPID-2835224",
          "CSAFPID-2835225",
          "CSAFPID-2835627",
          "CSAFPID-2835625",
          "CSAFPID-2835626",
          "CSAFPID-2835624",
          "CSAFPID-2835621",
          "CSAFPID-2835622",
          "CSAFPID-2835620",
          "CSAFPID-2835563",
          "CSAFPID-2835618",
          "CSAFPID-2835617",
          "CSAFPID-2835616",
          "CSAFPID-2835615",
          "CSAFPID-2835634",
          "CSAFPID-2835613",
          "CSAFPID-2835612",
          "CSAFPID-2835218",
          "CSAFPID-2835610",
          "CSAFPID-2835609",
          "CSAFPID-2835217",
          "CSAFPID-2835607",
          "CSAFPID-2835606",
          "CSAFPID-2835595",
          "CSAFPID-2835594",
          "CSAFPID-2835557",
          "CSAFPID-2835429",
          "CSAFPID-2835439",
          "CSAFPID-2835428",
          "CSAFPID-2835427",
          "CSAFPID-2835644"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27488",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27488.json"
        }
      ],
      "title": "CVE-2025-27488"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…